cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

TECHZONE™

TECHZONE CYBERNEWS && UPDATES Wᴇʟᴄᴏᴍᴇ Tᴏ TECHZONE™ ✔️Infosec Facts ✔️Cheatsheets ✔️Free Courses ✔️Open source tools ✔️Tech news

Show more
Advertising posts
885
Subscribers
-124 hours
-67 days
-1830 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors across the world between 2021 and 2023. While one cluster of activity has been associated with the ChamelGang (aka CamoFei), the second cluster overlaps with activity previously attributed to Chinese and North Korean
Show all...
Practical Guidance For Securing Your Software Supply Chain https://thehackernews.com/2024/06/practical-guidance-for-securing-your.html The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come as no surprise. In the last several years, the software supply chain has become an increasingly attractive target for attackers who see opportunities to force-multiply their attacks by orders of magnitude. For example, look no
Show all...
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones in an unauthorized manner. Tracked as CVE-2024-27867, the authentication issue affects AirPods (2nd generation and later), AirPods Pro (all models), AirPods Max, Powerbeats Pro, and Beats Fit Pro. "When your headphones are seeking a connection request to one of your previously
Show all...
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites https://thehackernews.com/2024/06/new-credit-card-skimmer-targets.html Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit card web skimmer called Caesar Cipher Skimmer. A web skimmer refers to malware that is injected into e-commerce sites with the goal of stealing financial and payment information.  According to Sucuri, the latest campaign entails making malicious modifications to the
Show all...
New Medusa Android Trojan Targets Banking Users Across 7 Countries https://thehackernews.com/2024/06/new-medusa-android-trojan-targets.html Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used to target users in Canada, France, Italy, Spain, Turkey, the U.K., and the U.S. The new fraud campaigns, observed in May 2024 and active since July 2023, manifested through five different botnets operated by various affiliates, cybersecurity firm Cleafy said in an analysis
Show all...
Buying a VPN? Here’s what to know and look for https://www.welivesecurity.com/en/privacy/buying-vpn-what-know-look-for/ VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes
Show all...
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack https://thehackernews.com/2024/06/over-110000-websites-affected-by.html Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired the domain and modified the JavaScript library ("polyfill.js") to redirect users to malicious and scam sites. More than 110,000 sites that embed the library are impacted by the supply chain attack, Sansec said in a Tuesday report. Polyfill is a popular library that
Show all...
New Attack Technique Exploits Microsoft Management Console Files https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses. Elastic Security Labs has codenamed the approach GrimResource after identifying an artifact ("sccm-updater.msc") that was uploaded to the VirusTotal malware
Show all...
How to Cut Costs with a Browser Security Platform https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do not protect from internal data exfiltration, like employees pasting sensitive data to ChatGPT. As it
Show all...
Wikileaks' Julian Assange Released from U.K. Prison, Heads to Australia https://thehackernews.com/2024/06/wikileaks-julian-assange-released-from.html WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five years in a maximum security prison at Belmarsh for what was described by the U.S. government as the "largest compromises of classified information in the history" of the country. Capping off a 14-year legal saga, Assange, 52, pleaded guilty to one criminal count of conspiring to
Show all...
Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.