Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Google confirms hackers gained access to law enforcement portal

Google confirms hackers gained access to law enforcement portal

by Syndicated News Feed | Sep 15, 2025 | IT Security

Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses to submit official data requests to the company “We have identified that a fraudulent account was created in our system...
Ransomware crims broke in, found recovery codes in plaintext • The Register

Ransomware crims broke in, found recovery codes in plaintext • The Register

by Syndicated News Feed | Sep 15, 2025 | IT Security

Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least one case, because a user’s recovery codes were left sitting in a plaintext file on their...
How IGA brings hidden access risks to light • The Register

How IGA brings hidden access risks to light • The Register

by Syndicated News Feed | Sep 15, 2025 | IT Security

Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories they can open, and what information they can retrieve. Yet despite their crucial role in IT...
Cyber-scam camp operators shifting to vulnerable countries • The Register

Cyber-scam camp operators shifting to vulnerable countries • The Register

by Syndicated News Feed | Sep 14, 2025 | IT Security

Criminals appear to be moving cyber-scam centers to vulnerable countries. The United Nations Office on Drugs and Crime (UNDOC) last week warned it had found “indications of scam center activity, including SIM cards and satellite internet devices” at a hotel in...
FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data

FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data

by Syndicated News Feed | Sep 14, 2025 | IT Security

The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’ Salesforce environments to steal data and extort victims. “The Federal Bureau of Investigation (FBI) is releasing this FLASH to...
New VoidProxy phishing service targets Microsoft 365, Google accounts

New VoidProxy phishing service targets Microsoft 365, Google accounts

by Syndicated News Feed | Sep 14, 2025 | IT Security

A newly discovered phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, including those protected by third-party single sign-on (SSO) providers such as Okta. The platform uses adversary-in-the-middle (AitM) tactics to...
Destroy data on old laptops or face major liability • The Register

Destroy data on old laptops or face major liability • The Register

by Syndicated News Feed | Sep 14, 2025 | IT Security

With the end of Windows 10’s regular support cycle fast approaching, and a good five years since the COVID pandemic spurred a wave of hardware replacements to support remote work, many IT departments are in the process of refreshing their fleets. But what they...
HybridPetya ransomware dodges UEFI Secure Boot • The Register

HybridPetya ransomware dodges UEFI Secure Boot • The Register

by Syndicated News Feed | Sep 12, 2025 | IT Security

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature...
Samsung patches Android 0-day exploited in the wild • The Register

Samsung patches Android 0-day exploited in the wild • The Register

by Syndicated News Feed | Sep 12, 2025 | IT Security

Samsung has fixed a critical flaw that affects its Android devices – but not before attackers found and exploited the bug, which could allow remote code execution on affected devices. The vulnerability, tracked as CVE-2025-21043, affects Android OS versions 13,...
New HybridPetya ransomware can bypass UEFI Secure Boot

New HybridPetya ransomware can bypass UEFI Secure Boot

by Syndicated News Feed | Sep 12, 2025 | IT Security

A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on the EFI System Partition. HybridPetya appears inspired by the destructive Petya/NotPetya malware that encrypted computers and...
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,619)

Recent Posts

  • Hackers claim Discord breach exposed data of 5.5 million users 10/08/2025
  • Microsoft enables Exchange Online auto-archiving by default 10/08/2025
  • Salesforce refuses to pay ransomware crims’ extortion demand • The Register 10/08/2025
  • Germany slams brakes on EU’s Chat Control snoopfest • The Register 10/08/2025
  • Salesforce refuses to pay ransom over widespread data theft attacks 10/07/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.