Rapidly Information Technology News
GitHub is being exploited to disseminate the Lumma Stealer under the guise of fake patches, posted as comments in various projects. This campaign was reported by a member of the teloxide library. In the...
In recent years, cyberattacks have emerged as a significant threat to German companies, with their frequency rising at an alarming rate. According to a recent study by the digital association Bitkom, China became the...
The U.S. Federal Trade Commission (FTC) has mandated that Verkada, a company specializing in surveillance cameras, develop and implement a comprehensive information security program. This decision was made following revelations that the company failed...
North Korean hackers are exploiting a zero-day vulnerability in Google Chrome to gain control over systems and seize victims’ crypto-assets. Microsoft experts confirmed that the group Citrine Sleet (formerly DEV-0139) leveraged the zero-day CVE-2024-7971...
On August 27, 2024, JAS, a global logistics operator, encountered a ransomware cyberattack that disrupted its business operations across multiple countries. Upon detecting the incident, JAS swiftly secured its systems and initiated an investigation...
Recently, FortiGuard Labs, the research division of Fortinet, detected a new phishing campaign distributing malware via an attached Excel document. An in-depth analysis revealed that this document delivers a new version of Snake Keylogger,...
In the first half of 2024, Europe faced a sharp increase in the number of cyberattacks linked to Distributed Denial of Service (DDoS). According to a study by FalconFeeds.io, 3,529 DDoS incidents were recorded...
Researchers at BforeAI have uncovered a large-scale phishing campaign targeting international pizza chains, resulting in significant financial losses. The investigation began after receiving information from the Singapore Police about a phishing threat, as reported...
On August 24, the Steam platform experienced a sudden outage, leading to widespread complaints from players around the world who were unable to access their accounts. Initially, many users speculated that the incident was...
Hackers are employing malware disguised as the Palo Alto GlobalProtect tool, which can steal data and execute remote PowerShell commands to further infiltrate internal networks. Organizations in the Middle East have fallen victim to...
The city of Columbus, Ohio, has filed a lawsuit against cybersecurity researcher David Leroy Ross, known as Connor Goodwolf. He is accused of illegally downloading and distributing data stolen from the city’s IT network...
CrowdStrike has encountered financial difficulties following a failed update to its Falcon Sensor, which resulted in a global IT network outage. According to the company’s management, this event is expected to negatively impact revenues...