An Indian national pleaded guilty to wire fraud conspiracy for stealing over $37 million through a fake Coinbase website used to steal credentials. […]
Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data
Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information.
“Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers,”
“Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers,”
ICQ messenger shuts down after almost 28 years
The ICQ messaging app is shutting down on June 26th, marking the end of a much-beloved communication application. […]
Hacker defaces spyware app’s site, dumps database and source code
A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data. […]
Microsoft: Windows 24H2 will remove Cortana and WordPad apps
Microsoft says the Cortana, Tips, and WordPad applications will be automatically removed on systems upgraded to the upcoming Windows 11 24H2 release. […]
Microsoft Copilot fixed worldwide after 24 hour outage
After over a 24-hour outage, Microsoft’s Bing, Copilot, and Copilot in Windows services are back online worldwide, with no information released as to what caused the problem. […]
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the actor creating rogue virtual machines (VMs) within its VMware environment.
“The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access,” MITRE
“The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access,” MITRE
Cencora data breach exposes US patient info from 8 drug companies
Some of the largest drug companies in the world have disclosed data breaches due to a February 2024 cyberattack at Cencora, whom they partner with for pharmaceutical and business services. […]
New ShrinkLocker ransomware uses BitLocker to encrypt your files
A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker. […]
Fake Antivirus Websites Deliver Malware to Android and Windows Devices
Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android and Windows devices.
“Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices
“Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices
