Recently a public exploit for the major zero-day vulnerability known as ‘Log4Shell’ in the Apache Log4j Java-based logging platform has been made available. Log4j is a development platform that enables…
Tag: YouTube
Most Recent iOS Updates from Apple Fix Remote Jailbreak Exploit for iPhones
Earlier this week, Apple announced security patches for various weaknesses in iOS, macOS, tvOS, and watchOS, including a remote jailbreak exploit chain and several critical flaws in the Kernel and…
Karakurt: Another Threat Actor Group on the Cyberthreat Landscape
Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…
The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime
Kronos is a workforce management and human resources company that offers cloud-based solutions for timekeeping, payroll, employee benefits, analytics, and other tasks. Kronos merged with Ultimate Software in 2020 to…
French Users and Orgs Targeted by TinyNuke Info-Stealing Malware
According to security researchers, the TinyNuke banking malware (also known as Nukebot) has resurfaced in a new operation exclusively targeting French users and organizations with invoice-themed email lures. The targets…
The Use of Gift Cards as a Scam Payment Method Has Increased Dramatically, FTC Data Shows
According to the US Federal Trade Commission (FTC), customers across the country reported losing $148 million in scams where gift cards were used as a payment method. This amount is…
Volvo Cars Data Breach Results in Theft of Proprietary Information
A Volvo Cars data breach has been disclosed by the company itself, announcing in a post on the 10th of December that a limited amount of the R&D property was…
Hackers Use QR Codes to Steal Banking Credentials in Recent Phishing Attempts
Over the last few weeks, a new phishing operation focusing on e-banking users from Germany has been in progress, using QR codes during the credential-stealing operation. As explained by BleepingComputer,…