Category Security

Scottish Parliament TV at Risk of Deepfake Attacks

Deepfake technologies threaten the integrity of live video streams and recordings of Scottish Parliamentary proceedings, according to new research by the Scottish Centre for Crime and Justice Research (SCCJR) and the University of Edinburgh. The researchers analyzed potential deepfake attacks…

New AppLite Malware Targets Banking Apps in Phishing Campaign

A sophisticated phishing campaign distributing a newly identified malware variant called AppLite Banker has been uncovered. Security researchers from Zimperium’s zLabs identified the malware as an updated version of the Antidot banking Trojan. The campaign, which primarily targets Android devices,…

3AM Ransomware: What You Need To Know

What is 3AM? 3AM (also known as ThreeAM) is a ransomware group that first emerged in late 2023. Like other ransomware threats, 3AM exfiltrates victims’ data (threatening to release it publicly unless a ransom is paid) and encrypts the copies…

Hackers Exploit AWS Misconfigurations in Massive Data Breach

A significant cyber operation exploiting vulnerabilities in improperly configured public websites has been linked to the Nemesis and ShinyHunters hacking groups, exposing sensitive data, including customer information, infrastructure credentials and proprietary source code. According to independent cybersecurity researchers Noam Rotem and Ran…

Automated Internal and External Pentesting

Dec 10, 2024The Hacker NewsVulnerability / Perimeter Security In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs, resource requirements,…