Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists

01/02/2025 0 Comments 0 tags

Meta-owned WhatsApp on Friday said it disrupted a campaign that involved the use of spyware to target journalists and civil society members. The campaign, which targeted around 90 members, involved

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts

01/02/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malvertising campaign that’s targeting Microsoft advertisers with bogus Google ads that aim to take them to phishing pages that are capable of harvesting their credentials.

Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns

31/01/2025 0 Comments 0 tags

Italy’s data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek’s service within the country, citing a lack of information on its use of users’ personal data. The development

Google Bans 158,000 Malicious Android App Developer Accounts in 2024

31/01/2025 0 Comments 0 tags

Google said it blocked over 2.36 million policy-violating Android apps from being published to the Google Play app marketplace in 2024 and banned more than 158,000 bad developer accounts that

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

31/01/2025 0 Comments 0 tags

Broadcom has released security updates to patch five security flaws impacting VMware Aria Operations and Aria Operations for Logs, warning customers that attackers could exploit them to gain elevated access

CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors

31/01/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued alerts about the presence of hidden functionality in Contec CMS8000 patient monitors and

Top 5 AI-Powered Social Engineering Attacks

31/01/2025 0 Comments 0 tags

Social engineering has long been an effective tactic because of how it focuses on human vulnerabilities. There’s no brute-force ‘spray and pray’ password guessing. No scouring systems for unpatched software.

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

30/01/2025 0 Comments 0 tags

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

30/01/2025 0 Comments 0 tags

An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

30/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS