GodLoader Malware Infects Thousands via Game Development Tools
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 devices Read More
Mimic ransomware: what you need to know
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool ("Everything" by Voidtools) to quickly locate files...
Malicious Actors Exploit ProjectSend Critical Vulnerability
This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation Read More
Critical Vulnerabilities Discovered in Industrial Wireless Access Point
Customers of Advantech’s EKI-6333AC-2G industrial-grade wireless access point have been urged to update their devices to new firmware versions Read More
Albanian Drug Smugglers Busted After Cops Decrypt Comms
European police have arrested 21 individuals linked to a violent Albanian gang after decrypting their Sky ECC communications Read More
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
The CSO of T-Mobile has clarified that no customer information was stolen by Chinese hacking group Salt Typhoon Read More
Smashing Security podcast #395: Gym hacking, disappearing DNA, and a social lockout
A Kansas City man is accused of hacking into local businesses, not to steal money, but to... get a cheaper gym membership? A DNA-testing firm...
Attack Group APT-C-60 Targets Japan Using Trusted Platforms
APT-C-60 targets Japan with phishing emails, using job application ruse and malware via Google Drive Read More
New Bootkit “Bootkitty” Targets Linux Systems via UEFI
Bootkitty, the first Linux-targeting UEFI bootkit, bypassed kernel security in a proof-of-concept attack Read More
New EU Commission to Unveil Healthcare Cybersecurity Plan in First 100 Days
One of the priorities of the newly-approved Von der Leyen Commission II will be to strengthen the healthcare sector’s cyber resilience Read More