Category: security
New cryptojacking attacks target uncommon AWS instances
Cybersecurity researchers from Sysdig recently uncovered a new cryptojacking campaign that targeted uncommon Amazon Web Services (AWS) services. Cryptojacking is a type of cyberattack in which the threat actor secretly installs a cryptocurrency miner on a target endpoint. While not malicious per se, miners bring profit to their owners, while…
Read MoreGoogle Chrome teases full tracking protection tool to keep users protected
Google is reportedly working on a new ‘Tracking Protection’ section to the Settings menu in Chrome to help users more easily navigate a variety of tools designed to help protect them against web tracking. The news comes from Windows Insider, which claims to have spotted clues about the upcoming update…
Read MoreMicrosoft AI researchers leaked 38TB worth of private company data
They say misconfigured cloud storage is the leading cause of data leaks these days, and Microsoft’s latest slip-up is the perfect example. Cybersecurity researchers from Wiz discovered a huge, unlocked database, hosting sensitive information on hundreds of people, including private keys and passwords. The database, as it turned out, belonged…
Read MoreChinese hackers are exploiting a new Linux backdoor to target national governments
A Chinese threat actor was observed targeting multiple governments around the world with a new Linux backdoor, according to new findings from Trend Micro. As reported by BleepingComputer, the group is called Earth Lusca, and has been active in the first half of the year, targeting government organizations in Southeast…
Read MoreTop business software development platform Retool breached, blames Google Authenticator
Software development platform Retool has pointed the finger of blame at Google after suffering a data breach. Here’s what happened: a hacking collective engaged in SMS phishing and social engineering managed to steal login credentials for an Okta account belonging to a Retool IT employee. It was quite an elaborate…
Read MoreCloud changes are to blame for nearly all cyber-attacks
Of all the vulnerabilities an organization’s system has, the majority sit within its cloud environment, a new report from cybersecurity researchers Unit 42, part of Palo Alto Networks, has found. As per the report, four in five (80%) of all flaws reside in the cloud. Of those flaws, the most common…
Read MoreRecent Posts
- 3 features that would actually make me pay for a Samsung Health subscription for my Galaxy Watch – and one big problem it needs to avoid
- TikTok’s ‘ban’ problem could end soon with a new app and a sale
- 16-Core AMD EPYC 4005 CPU is almost 3X faster than AMD’s first server flagship – and I can’t believe what a bargain that is
- Samsung’s very special rugged tablet comes with eight – yes, eight – years of Android updates and hot-swappable batteries
- The latest Samsung Galaxy Z Flip 7 leak is the first hands-on video of the flip foldable
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022