16 Oct, 2024

Hackers Downloaded Call Logs from Cloud Platform in AT&T Breach

Telecommunications giant AT&T has revealed that customer data has been illegally downloaded by threat actors. Hackers have downloaded the data from AT&T’s its workspace on a third-party cloud platform, the company confirmed in a statement published on July 12. According to a filing with the US Securities and Exchange Commission (SEC), the company first learned […]

5 mins read

League of Legends’ Anima Squad Is Back With New PvE Game Mode, Character Skins & More

Grab your squad and suit up for a League of Legends-themed summer, as the popular MOBA returns to the world of Anima Squad with 11 new character skins, a new PvE game mode, Swarm | Operation, and a closer look at the Primordials. The event debuted in 2022, and featured Jinx, Sylas, Riven, Miss Fortune, and Vayne as […]

4 mins read

NATO Set to Build New Cyber Defense Center

NATO’s members have agreed to the construction of a new cyber-defense facility designed to help the military alliance build resilience and better respond to digital threats. As the alliance celebrated its 75th anniversary with a summit in Washington DC from 9 to 11 July, it revealed plans for a new NATO Integrated Cyber Defence Centre […]

2 mins read

Microsoft Outlook Faced Critical Zero-Click RCE Vulnerability

Security researchers have uncovered a critical vulnerability, CVE-2024-38021, affecting most Microsoft Outlook applications. This zero-click remote code execution (RCE) vulnerability, now patched by Microsoft, did not require any authentication, setting it apart from the previously discovered CVE-2024-30103, which required at least an NTLM token. If exploited, CVE-2024-38021 could lead to data breaches, unauthorized access and […]

1 min read

Intel’s 14th Gen & 13th Gen CPU Instability Issues Forces Game Studio “Alderon Games” To Switch To AMD, Advises Customers The Same

Intel’s 14th Gen & 13th Gen CPU gaming instability issues have now started to plague game developers, as the team at Alderon Games reveals its troublesome experience using these chips. Intel’s 14th & 13th Gen CPU Gaming Instability Issues Have Stirred A New Problem In The Markets; Consumers Start Opting For Alternatives Such As AMD […]

3 mins read

Meet ‘League of Legends’ Latest Mage Champion, Aurora

League of Legends is ready to bring its newest champion to the game. Enter Vastayan bunny warrior Aurora, who makes her debut in the second split of Season 14 as a top and mid-laner. First teased in the Spirit of the Hearth mini-game, Aurora appeared as an explorer who forged an unlikely friendship with demi-god champion Ornn, […]

3 mins read

BlastRADIUS bug puts most networking devices at risk

A newly discovered flaw in the RADIUS networking protocol has the industry recognizing that a standard set in 1997 is now in need of an upgrade — even while researchers warn that well-funded state-sponsored attackers can exploit the flaw to bypass multi-factor authentication (MFA) and gain network access. In a July 9 blog post, researchers […]

3 mins read

Victims of cyber extortion and ransomware increase in 2024

More than 4,000 new victims of ransomware were recorded over the past 12 months. According to research by Orange Cyberdefense, there was a 77% year-on-year growth from 2023 with 4,374 new victims detected in 75% of countries monitored. In the first quarter of 2024, there were 1,046 victims hit by 43 different threat actors. Speaking […]

3 mins read

PHP bug executes RCEs, cryptominers and DDoS attacks

Not long after a new PHP bug was disclosed in the late spring, Akamai researchers observed numerous attempts to exploit the vulnerability, which they said indicates high exploitability and quick adoption by threat actors. Because PHP is one of the most popular server-side scripting languages used to create dynamic web pages on more than 75% […]

2 mins read

Internet Explorer still used as a malware vehicle by threat actors

Microsoft’s notorious Internet Explorer has been brought out of retirement by threat actors using its security holes to serve malware. The team at Check Point Research said it spotted a new attack in the wild which uses the ancient web browser as the delivery vehicle for malware infections. The process involves the use of a […]

2 mins read