Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs
India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements
“Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent,” India’s Press Information Bureau (PIB) said in a statement released Sunday.
“Citizens are empowered with rights to demand data erasure,
Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024
Close to $500 million in cryptocurrency from over 332,000 addresses was stolen in 2024 using wallet drainer malware.
The post Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024 appeared first on SecurityWeek.
Code Execution Flaw Found in Nuclei Vulnerability Scanner
A vulnerability in Nuclei’s template signature verification system could have allowed attackers to execute arbitrary code.
The post Code Execution Flaw Found in Nuclei Vulnerability Scanner appeared first on SecurityWeek.
Microsoft Bing shows misleading Google-like page for ‘Google’ searches
Cybersecurity M&A Roundup: 37 Deals Announced in December 2024
Roundup of the thirty-seven cybersecurity-related merger and acquisition (M&A) deals announced in December 2024.
The post Cybersecurity M&A Roundup: 37 Deals Announced in December 2024 appeared first on SecurityWeek.
Tenable Disables Nessus Agents Over Faulty Updates
Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline.
The post Tenable Disables Nessus Agents Over Faulty Updates appeared first on SecurityWeek.
Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion
Many cars know where you’ve been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing.
The post Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion appeared first on SecurityWeek.
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
This week, we dive into the hidden risks, surprising loopholes, and the clever tricks
