by Syndicated News Feed | Jul 16, 2025 | IT Security
A 21-year old former U.S. Army soldier pleaded guilty to charges of hacking and extorting at least ten telecommunications and technology companies in the country. Cameron John Wagenius was arrested in Texas on December 20, 2024 and indicted in the Western District of...
by Syndicated News Feed | Jul 16, 2025 | IT Security
Ukrainian hackers claim to have taken out the IT infrastructure at Russia’s Gaskar Integration plant, one of the largest suppliers of drones for its army, and also destroyed massive amounts of technical data related to drone production. Or, as described by the...
by Syndicated News Feed | Jul 16, 2025 | IT Security
International cops shut down more than 100 servers belonging to the pro-Russian NoName057(16) network this week as part of the Europol-led Operation Eastwood. The joint law enforcement effort involved 19 countries across Europe and North America, and resulted in two...
by Syndicated News Feed | Jul 16, 2025 | IT Security
A threat actor has been deploying a previously unseen malware called OVERSTEP that modifies the boot process of fully-patched but no longer supported SonicWall Secure Mobile Access appliances. The backdoor is a user-mode rootkit that allows hackers to hide malicious...
by Syndicated News Feed | Jul 16, 2025 | IT Security
Updated Unknown miscreants are exploiting fully patched, end-of-life SonicWall VPNs to deploy a previously unknown backdoor and rootkit, likely for data theft and extortion, according to Google’s Threat Intelligence Group. In research published on Wednesday, the...
by Syndicated News Feed | Jul 16, 2025 | IT Security
Co-op Group’s chief executive officer has confirmed that all 6.5 million of the organization’s members had their data stolen during its April cyberattack – Scattered Spider is believed to be behind the digital heist. Shirine Khoury-Haq confirmed the...
by Syndicated News Feed | Jul 15, 2025 | IT Security
OpenAI’s image gen model, which is available via ChatGPT for free, now lets you easily create AI images even if you’re not familiar with trends or prompt engineering. Right now, if you want to create outstanding anime art, you need to come up with a very...
by Syndicated News Feed | Jul 15, 2025 | IT Security
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection. Konfety poses as a legitimate app, mimicking innocuous products available on Google Play, but...
by Syndicated News Feed | Jul 15, 2025 | IT Security
AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants. While its capabilities are not that impressive on their own, it is the open-source nature of AsyncRAT that has...
by Syndicated News Feed | Jul 15, 2025 | IT Security
The F-35 stealth fighter is not meeting its potential in British service because of availability issues, a shortage of support personnel, and delays in integrating key weapons that are limiting the aircraft’s effectiveness. The various problems are highlighted...