The Canadian government intends to ban the Flipper Zero and similar devices, citing them as tools used by thieves for car theft. The Flipper Zero is a portable pen-testing tool capable of experimenting with and debugging various hardware and digital devices through multiple protocols like RFID, radio, NFC, infrared, and Bluetooth. Users have showcased the […]
Google warns of a novel cyber threat using cloud services as attackers repurpose Google Calendar events for command-and-control (C2) operations. The “Google Calendar RAT” exploit, initially shared on GitHub in June, has caught attention in the cybersecurity community, with 15 forks indicating interest, although not yet observed in active deployment. Cybercriminals are increasingly leveraging legitimate […]
The Federal Communications Commission (FCC) has implemented robust rules on November 15, 2023, to safeguard consumers against scams targeting their cell phone accounts. The rules specifically combat SIM swapping and port-out fraud, shielding users from scammers attempting to manipulate their personal information and data. Scammers often use SIM swapping to fraudulently transfer a victim’s wireless […]
A widespread brand impersonation campaign has been targeting over 100 popular apparel, footwear, and clothing brands since June 2022. The campaign involves approximately 6,000 fake websites across at least 3,000 domains, including inactive ones. Brands such as Nike, Puma, Asics, Vans, Adidas, and many others have been impersonated.The campaign experienced a significant increase in activity […]
Large language models (LLMs), such as ChatGPT, have gained immense popularity and are being rapidly deployed by various organizations.LLMs are trained on large amounts of text-based data and use deep learning to generate human-like text. While LLMs have impressive capabilities, they are not perfect and can make mistakes, hallucinate incorrect facts, and exhibit biases. Concerns […]
The FBI and the US Secret Service NSA have published an updated guide to stop ransomware. The revised guide includes lessons learned from the past few years and additional recommendations to limit the impact of ransomware. The manual describes several steps that are important in preventing ransomware or limiting the impact, such as preparing for […]
Cybercriminals have employed a sophisticated attack method by infecting TP-Link router firmware to target European Union (EU) entities, as reported by Bleeping Computer.The attackers have compromised the firmware of TP-Link routers, a popular brand used widely across Europe, to gain unauthorized access and launch cyberattacks.The infected firmware allows hackers to control the compromised routers remotely, […]
Toyota has exposed the location data of 2.3 million customers for over a decade. The information was accessible due to a security breach in their sales module. The data included customers’ names, email addresses, and vehicle identification numbers (VINs). The breach occurred in Japan, but the data of customers from several countries, including the US […]
Many corporate boards are not having the right conversations about cybersecurity, according to a recent article in Harvard Business Review.Boards often focus on technical details and compliance rather than strategic risk management and governance. This can result in a false sense of security and a failure to adequately address emerging threats.Boards should engage in regular […]
Researchers have found malware on the systems of 3CX, which provides software for VoIP solutions worldwide and fell victim to a supply chain attack. Both macOS and Windows systems of the software supplier turned out to be infected, 3CX said in an update about the attack. How the infections could have occurred has still not […]
- 1
- 2