Sophisticated AI-Powered Gmail Phishing Attack Reported
On January 30th, 2025, a sophisticated AI-driven phishing attack targeting Gmail users was reported, using realistic voice impersonations, spoofed Google numbers, and emails from a legitimate Google domain to trick victims into revealing account reset codes. Google has suspended the malicious accoun...
Sophisticated AI-Powered Gmail Phishing Attack Reported
On January 30th, 2025, a sophisticated AI-driven phishing attack targeting Gmail users was reported, using realistic voice impersonations, spoofed Google numbers, and emails from a legitimate Google domain to trick victims into revealing account reset codes. Google has suspended the malicious accoun...
Progress
44% Bias Score
FBI Warning: North Korean IT Workers Steal Data from US Businesses
The FBI warns of North Korean IT workers using unlawful system access to steal data from US businesses; victims faced data ransom, code theft, and credential harvesting; mitigation advice includes disabling local admin accounts and implementing strict identity verification.
FBI Warning: North Korean IT Workers Steal Data from US Businesses
The FBI warns of North Korean IT workers using unlawful system access to steal data from US businesses; victims faced data ransom, code theft, and credential harvesting; mitigation advice includes disabling local admin accounts and implementing strict identity verification.
Progress
52% Bias Score
Weak Passwords Fuel Millions of Attacks in 2024
An analysis of 2024's worst passwords reveals that "password", "qwerty123", and "123456" were used millions of times in attacks, highlighting the urgent need for stronger passwords and prompting recommendations for improved security practices, including the adoption of passkeys.
Weak Passwords Fuel Millions of Attacks in 2024
An analysis of 2024's worst passwords reveals that "password", "qwerty123", and "123456" were used millions of times in attacks, highlighting the urgent need for stronger passwords and prompting recommendations for improved security practices, including the adoption of passkeys.
Progress
44% Bias Score
Star Blizzard Uses WhatsApp QR Code Phishing to Target Government Officials
Russian state-linked hackers, Star Blizzard, used phishing emails with QR codes to target WhatsApp accounts of government officials worldwide, aiming to undermine trust in politics and exfiltrate data.
Star Blizzard Uses WhatsApp QR Code Phishing to Target Government Officials
Russian state-linked hackers, Star Blizzard, used phishing emails with QR codes to target WhatsApp accounts of government officials worldwide, aiming to undermine trust in politics and exfiltrate data.
Progress
12% Bias Score
Coordinated Cyberattack Disrupts Italian Banks and Infrastructure
Pro-Russian hackers NoName057(16), collaborating with pro-Palestinian group Alixsec, launched a DDoS attack on Italian banks, water companies, ports, and businesses, including Intesa San Paolo, causing service disruptions and highlighting the escalating threat of coordinated cyberattacks.
Coordinated Cyberattack Disrupts Italian Banks and Infrastructure
Pro-Russian hackers NoName057(16), collaborating with pro-Palestinian group Alixsec, launched a DDoS attack on Italian banks, water companies, ports, and businesses, including Intesa San Paolo, causing service disruptions and highlighting the escalating threat of coordinated cyberattacks.
Progress
36% Bias Score
Hackers Exploit Google Search to Distribute Malicious Chrome Extensions
Hackers manipulate Google's Chrome Web Store search to promote malicious extensions using multilingual keyword stuffing and deceptive name variations, potentially exposing hundreds of millions of users to data theft and 2FA bypass.
Hackers Exploit Google Search to Distribute Malicious Chrome Extensions
Hackers manipulate Google's Chrome Web Store search to promote malicious extensions using multilingual keyword stuffing and deceptive name variations, potentially exposing hundreds of millions of users to data theft and 2FA bypass.
Progress
28% Bias Score
International Crackdown Shuts Down Major Cybercrime Forums
German and international authorities shut down the cybercrime forums nulled.to and cracked.io, arresting eight individuals, seizing 67 devices and assets worth a mid-six-figure sum, and disrupting associated payment and hosting services.
International Crackdown Shuts Down Major Cybercrime Forums
German and international authorities shut down the cybercrime forums nulled.to and cracked.io, arresting eight individuals, seizing 67 devices and assets worth a mid-six-figure sum, and disrupting associated payment and hosting services.
Progress
44% Bias Score
Hackers Target Novice Hackers in Global Malware Attack
A trojanized malware builder, targeting novice hackers, compromised over 18,000 devices globally via GitHub, Telegram, and file-sharing platforms, highlighting conflict within the hacking community and the evolution of cybercriminal tactics.
Hackers Target Novice Hackers in Global Malware Attack
A trojanized malware builder, targeting novice hackers, compromised over 18,000 devices globally via GitHub, Telegram, and file-sharing platforms, highlighting conflict within the hacking community and the evolution of cybercriminal tactics.
Progress
32% Bias Score
US Sanctions Chinese Entities for Cyberattacks Targeting Top Officials
The Biden administration imposed sanctions on a Chinese tech firm and an individual for allegedly orchestrating cyberattacks that targeted US telecommunication companies and the Treasury Department, compromising sensitive information belonging to senior US officials, including President-elect Trump ...
US Sanctions Chinese Entities for Cyberattacks Targeting Top Officials
The Biden administration imposed sanctions on a Chinese tech firm and an individual for allegedly orchestrating cyberattacks that targeted US telecommunication companies and the Treasury Department, compromising sensitive information belonging to senior US officials, including President-elect Trump ...
Progress
40% Bias Score
iPhone 15 USB-C Controller Hack: Security Researchers Reveal Vulnerability
Security researcher Thomas Roth bypassed Apple's iPhone 15 ACE3 USB-C controller security, achieving code execution and firmware extraction; experts warn this could lead to future vulnerabilities, although Android users remain unaffected.
iPhone 15 USB-C Controller Hack: Security Researchers Reveal Vulnerability
Security researcher Thomas Roth bypassed Apple's iPhone 15 ACE3 USB-C controller security, achieving code execution and firmware extraction; experts warn this could lead to future vulnerabilities, although Android users remain unaffected.
Progress
48% Bias Score
Sex Toy Hacking Risk: UK Government Warns of Physical and Psychological Harm
A UK government-commissioned report highlights the risk of hacking Bluetooth-enabled sex toys, warning of potential physical (e.g., overheating, remote locking) and psychological (data breaches) harm due to unencrypted connections and insecure APIs.
Sex Toy Hacking Risk: UK Government Warns of Physical and Psychological Harm
A UK government-commissioned report highlights the risk of hacking Bluetooth-enabled sex toys, warning of potential physical (e.g., overheating, remote locking) and psychological (data breaches) harm due to unencrypted connections and insecure APIs.
Progress
56% Bias Score
Alleged Rosreestr Data Breach Raises Concerns in Russia
Hackers claim a 2 billion record data breach from Russia's Rosreestr, partially verified by a news outlet; Rosreestr denies the breach but is investigating, raising concerns about data security and access restrictions implemented in 2022 and 2023.
Alleged Rosreestr Data Breach Raises Concerns in Russia
Hackers claim a 2 billion record data breach from Russia's Rosreestr, partially verified by a news outlet; Rosreestr denies the breach but is investigating, raising concerns about data security and access restrictions implemented in 2022 and 2023.
Progress
36% Bias Score