Apple users are falling prey to a sophisticated phishing campaign designed to hijack their Apple IDs through what’s known as a “push bombing” or “MFA fatigue” attack. This method exploits the multi-factor authentication (MFA) system,...
A new threat has emerged, targeting unsuspecting iPhone users through the seemingly secure iMefofferssage platform. A sophisticated Phishing-as-a-Service (PhaaS) platform known as ‘Dracula’. This platform has been implicated in high-profile phishing attacks, leveraging the trust...
A security update released by ChatRTX on March 26th, 2024, addresses two vulnerabilities (CVE-2024-0082 and CVE-2024-0083) that could allow attackers to execute malicious code and tamper with data on affected systems. The vulnerabilities stem from...
Google patched seven vulnerabilities in the Chrome browser on Tuesday, including two zero-day exploits that were exploited at the Pwn2Own...
The source code and documentation of the Italian anti-piracy platform Privacy Shield have reportedly been leaked on the popular code-sharing...
Wireshark remains the go-to choice for both professionals and enthusiasts due to its unmatched capabilities in packet capturing and analysis....
A critical vulnerability has been identified in the TeamViewer Client for macOS. If exploited, this flaw could allow attackers to...
Guardio Labs has uncovered a significant vulnerability in Microsoft Edge, Microsoft’s flagship web browser, that could allow hackers to install...
Express News Service TENKASI: Cyber crimes that involve north Indian conmen -- who befriend people through Facebook, collect their phone...
A cyberattack on a subsidiary of a Dublin-based financial technology and trading firm ION Group has disrupted transactions for dozens...
TEL AVIV, Israel, Feb. 2, 2023 /PRNewswire/ -- HUB Cyber Security Ltd (TASE: HUB), a developer of Confidential Computing cybersecurity solutions...
Press play to listen to this article Voiced by artificial intelligence. POLITICO’s weekly transatlantic tech newsletter for global technology elites...
Over the past decade, geospatial and location-based technologies have been transforming the way businesses operate and fulfill customer commitments across...
At a glance.Wikipedia "degraded" in Pakistan for blasphemous content. Wiper attacks on Ukrinform. What a Russian media ban means: perspective...
A new tool dunned BlueDucky, automating the exploitation of a critical Bluetooth...
Google has unveiled its latest initiative the implementation of the Kernel Address...
The US Department of Justice (DOJ) has unsealed an indictment charging seven Chinese nationals with computer hacking and wire fraud...
Adobe has addressed a critical vulnerability in its ColdFusion software, which could have allowed attackers to read files arbitrarily from...
A critical flaw impacting macOS has been uncovered that gives unauthorized users, including those with guest access, the capacity to escalate...
New Zealand has joined the United Kingdom in strongly condemning the People’s Republic of China (PRC) for its state-backed cyber...
CISA and the FBI released the Secure by Design Alert to address SQL injection vulnerabilities in software that affect thousands...
In a concerning development in cyber warfare, the Iran-aligned threat actor known as TA450, also recognized by aliases such as...
The latest release from Metasploit, Framework 6.4, is a testament to this ongoing battle. It brings a host of new...
A significant vulnerability has been identified in the Rank Math SEO plugin for WordPress. This flaw, cataloged under CVE-2023-32600, exposes...
PuTTY is among the most popular targets of hackers due to several reasons. Firstly, it is used for remote access...
In a significant move to counter cyber threats, the United States and the United Kingdom have imposed sanctions on a...
A threat actor has claimed responsibility for a massive data breach affecting Kuwait Airways. According to the hacker’s statement on...
OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the...
Email hacking and fraud have become common these days. Cybercriminals can easily break into and take control of mail accounts...
Mozilla addresses two zero-day vulnerabilities that were recently exploited at the Pwn2Own Vancouver 2024 hacking contest in the Firefox web...
GEOBOX is specialized software designed for Raspberry Pi devices that have been observed on the Dark Web being marketed as...
Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.
LEARN MORE »