Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Cops take down Rhadamanthys infostealer, VenomRAT • The Register

Cops take down Rhadamanthys infostealer, VenomRAT • The Register

by Syndicated News Feed | Nov 13, 2025 | IT Security

International cops have pulled apart the Rhadamanthys infostealer operation, seizing 1,025 servers tied to the malware in coordinated raids between November 10-13. The infrastructure takedown, part of the long-running Operation Endgame coordinated by Europol and...
Can password managers get hacked? Here’s what to know

Can password managers get hacked? Here’s what to know

by Syndicated News Feed | Nov 13, 2025 | IT Security

Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe 13 Nov 2025  •  , 5 min. read The average internet user has an estimated 168 passwords for their personal accounts, according to a study from 2024. That’s a...
Google sues 25 China-based scammers behind phishing kit • The Register

Google sues 25 China-based scammers behind phishing kit • The Register

by Syndicated News Feed | Nov 12, 2025 | IT Security

Google has filed a lawsuit against 25 unnamed China-based scammers, which it claims have stolen more than 115 million credit card numbers in the US as part of the Lighthouse phishing operation. Lighthouse is a phishing software service described in the lawsuit [PDF]...
Google sues to dismantle Chinese phishing platform behind US toll scams

Google sues to dismantle Chinese phishing platform behind US toll scams

by Syndicated News Feed | Nov 12, 2025 | IT Security

Google has filed a lawsuit to dismantle “Lighthouse”, a phishing-as-a-service (PhaaS) platform used by cybercriminals worldwide to steal credit card information through SMS phishing (“smishing”) attacks that impersonate the U.S. Postal Service...
Synnovis notifies of data breach after 2024 ransomware attack

Synnovis notifies of data breach after 2024 ransomware attack

by Syndicated News Feed | Nov 12, 2025 | IT Security

Synnovis, a leading UK pathology services provider, is notifying healthcare providers that a data breach occurred following a ransomware attack in June 2024, which resulted in the theft of some patients’ data. Formerly known as Viapath, Synnovis was founded as...
China pins 2020 bitcoin heist on the USA • The Register

China pins 2020 bitcoin heist on the USA • The Register

by Syndicated News Feed | Nov 12, 2025 | IT Security

China’s National Computer Virus Emergency Response Center (CVERC) has alleged a nation-state entity, probably the USA, was behind a 2020 attack on a bitcoin mining operation and by doing so has gone into bat for entities that Beijing usually blasts. CVERC on Sunday...
Hackers abuse Triofox antivirus feature to deploy remote access tools

Hackers abuse Triofox antivirus feature to deploy remote access tools

by Syndicated News Feed | Nov 11, 2025 | IT Security

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet’s Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. The security issue leveraged in the attack is CVE-2025-12480 and...
EU’s leaked GDPR, AI reforms slated by privacy activists • The Register

EU’s leaked GDPR, AI reforms slated by privacy activists • The Register

by Syndicated News Feed | Nov 11, 2025 | IT Security

Privacy advocates are condemning the European Commission’s leaked plans to overhaul digital privacy legislation, accusing officials of bypassing proper legislative processes to favor Big Tech interests. Max Schrems, founder of privacy group Noyb, warned:...
Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

by Syndicated News Feed | Nov 11, 2025 | IT Security

From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company 11 Nov 2025  •  , 5 min. read Shadow IT has long been a thorn in the side of corporate security teams. After all, you can’t manage or protect what you...
APT37 hackers abuse Google Find Hub in Android data-wiping attacks

APT37 hackers abuse Google Find Hub in Android data-wiping attacks

by Syndicated News Feed | Nov 10, 2025 | IT Security

North Korean hackers are abusing Google’s Find Hub tool to track the GPS location of their targets and remotely reset Android devices to factory settings. The attacks are primarily targeting South Koreans, and start by approaching the potential victims over KakaoTalk...
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (2,838)

Recent Posts

  • Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison 11/28/2025
  • PostHog admits Shai-Hulud 2.0 was its biggest security scare • The Register 11/28/2025
  • Naver bought crypto exchange Upbit a day before $30m heist • The Register 11/27/2025
  • Malicious LLMs empower inexperienced hackers with advanced tools 11/27/2025
  • Scattered Lapsus$ Hunters stress testing Zendesk weak spots • The Register 11/27/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.