Cybersecurity

7 network security startups to watch

Enterprise cybersecurity protections are failing to keep pace with the evolving threat landscape, which now includes everything from the weaponization of AI to...

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

î ‚Aug 03, 2024î „Ravie LakshmananDDoS Attack / Server Security Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter...

DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

î ‚Aug 03, 2024î „Ravie LakshmananPrivacy / Data Protection The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against...

U.S. Trades Cybercriminals to Russia in Prisoner Swap – Krebs on Security

Twenty-four prisoners were freed today in an international prisoner swap between Russia and Western countries. Among the eight Russians repatriated were several convicted...

Attackers leverage Cloudflare tunnels to obscure malware distribution

Cybercriminals regularly abuse free services to host malware or to set up command-and-control (C2) infrastructure because they know connections to such services won’t...

Recent Articles