A data breach at an unnamed French hospital exposed the medical records of 750,000 patients after a threat actor gained access to its electronic patient record system. A threat actor …
Category:
Cyber Security
- Cyber Security
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
by Wire Techby Wire TechGhost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds …
NHIs Are the Future of Cybersecurity: Meet NHIDR The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. …
- Cyber Security
Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package
by Wire Techby Wire TechDecades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could …
- Cyber SecurityTechnology
Microsoft confirms game audio issues on Windows 11 24H2 PCs
by Wire Techby Wire TechMicrosoft has confirmed a new issue affecting Windows 24H2 systems and causing game audio to unexpectedly increase to full volume when using USB DAC sound systems. As the company explained …
- Cyber Security
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
by Wire Techby Wire TechNgioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as …
- Cyber Security
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
by Wire Techby Wire TechHackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming …
- Cyber SecurityTechnology
Apple fixes two zero-days used in attacks on Intel-based Macs
by Wire Techby Wire TechApple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems. “Apple is aware of a report that this issue may have …
- Cyber SecurityTechnology
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
by Wire Techby Wire TechThe U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog, including a critical OS command injection impacting Progress Kemp LoadMaster. …
Newer Posts