Amazon's AI coding assistant exposed nearly 1 million users to potential system wipe
The hacker said the point was to spotlight Amazon's lax security practices
Worldwide cyberattack underway as hackers exploit Microsoft SharePoint zero-day vulnerability
CISA has identified the exploit as a top-level security threat, a patch is now out
A hot potato: A newly uncovered security flaw in Microsoft's SharePoint software has sparked a widespread series of cyberattacks targeting government organizations, educational institutions, energy companies, and private enterprises around the globe. This threat has prompted coordinated investigations by authorities in the United States, Canada, and Australia, with cybersecurity experts warning that these intrusions represent one of the most serious server-level breaches seen in recent memory.
US rail industry still exposed to decade-old hacking threat, experts warn
"The railway industry treats cybersecurity issues with the same playbook as the insurance industry's 'delay, deny, defend' mantra"
Ransomware negotiator allegedly struck deals with hackers to profit from extortion payments
Justice Department investigates possible kickbacks in ransom cases
Brother printer hack puts thousands of users at risk of remote takeover
Hackers can regenerate default administrator passwords after learning a device's serial number
History made as Al claims number one spot among world's top ethical hackers
AI tool Xbow uncovers critical bugs faster than human researchers
Hackers show how they can fully control your 2020 Nissan Leaf remotely
Attackers can also record in-car conversations and track you using its GPS
US warns of Iranian cyberattacks and propaganda in wake of airstrikes
US water, power, and finance sectors could be prime targets
Israel urges citizens to turn off home cameras as Iran hacks surveillance systems
Home security cameras with weak passwords are easy targets for hackers
Low-wage tech support workers become a new gateway for cyberattacks
Outsourced call centers emerge as a new cybercrime battleground
Scammers hijack real support pages to show fake phone numbers
Hackers are also manipulating Google ads to plant fake support numbers
So... You Want to Become a Penetration Tester?
Penetration testing is a key part of cybersecurity: finding and safely exploiting system flaws. Learn the skills, tools, and steps to start your career as an ethical hacker in this growing field.
Hacker arrested after exploiting 5,000 accounts in $4.5 million cryptojacking scheme
Suspect could face up to 15 years in Ukranian prison
Scam calls evolve: Crocodilus malware adds fake contacts to Android phones
Crocodilus monitors and impersonates many specific banking apps worldwide
Modder develops a new solution to bring the Commodore 64 into the HDMI era
Using hardware emulation to recreate pixel-perfect digital video and audio
Coinbase hack could get people killed, TechCrunch founder warns
Executives of companies that don't adequately protect customer data should be punished
Inside job at Coinbase leads to massive data breach, $20 million ransom demanded
The company says the breach could cost them up to $400 million
Valve confirms Steam 2FA leak affecting 89 million users, no passwords compromised
Steam wasn't hacked, but you should probably start using the authenticator app anyway
Hacker breaches TeleMessage system used by US officials, raising security concerns
The dangers of archiving encrypted messaging for compliance
Someone tried, and mostly managed, to run Linux in an Excel spreadsheet
"This was done mostly for fun." We bet
FBI warns China is using AI to sharpen cyberattacks on US infrastructure
Federal authorities are beginning to see AI signs in every step of an attack chain
Researchers find numerous Apple AirPlay vulnerabilities allowing "wormable" exploits over Wi-Fi
Apple already issued patches, so be sure to update your systems immediately
In brief: Security researchers have uncovered a wide-ranging set of vulnerabilities in Apple's AirPlay protocol that could allow attackers to hijack Apple and third-party devices remotely without user interaction. The exploit chain, dubbed "AirBorne," includes 23 individual bugs – 17 with official CVEs – and enables zero-click remote code execution on vulnerable systems.
4chan was offline for nearly two weeks after hack, but it's now back on
Source code, admin email addresses, and subscriber info were all exposed in massive hack