Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
What’s new: Akira ransomware is exploiting the Intel CPU tuning driver 'rwdrv.sys' to disable Microsoft...
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
What’s new: Researchers have identified a vulnerability in Amazon Elastic Container Service (ECS) named ECScape,...
MFA matters… But it isn’t enough on its own
What’s new: Multi-factor authentication (MFA) is essential for enhancing security, but it is not sufficient...
Hacker extradited to US for stealing $3.3 million from taxpayers
What’s new: Chukwuemeka Victor Amachukwu, a Nigerian national, has been extradited from France to the...
New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations
What’s new: A new command-and-control (C2) evasion method called 'Ghost Calls' has been identified, which...
St. Paul Declares Emergency After Major Cyberattack; AI Malware and Cryptographic Breakthroughs Highlight Evolving Threats
🔐 St. Paul Cyberattack On July 25, 2025, the city of St. Paul, Minnesota was...
AI-generated npm package drains Solana wallets (1,500+ installs)
What’s new: Researchers uncovered @kodane/patch-manager, an AI-generated npm package that hid a stealth wallet drainer...
Conducting a Network Security Audit: A Comprehensive Guide
Conducting a network security audit is an important part of ensuring the safety and integrity...
EXECUTION VULNERABILITY IN THE MICROSOFT WINDOWS JET DATABASE ENGINE
Cyber security experts from the Zero Day Initiative discovered a vulnerability in the Microsoft JET...
Hacker crashes Google Play Store
Last Weekend Ibrahim Balic, a Turkish hacker crashes Google Play Store twice when he tried...