Latest news

TikTok Under Scrutiny: regulators probe teen data handling
Privacy

TikTok Under Scrutiny: regulators probe teen data handling

5 March 2025 securebulletin.com

TikTok, the massively popular short-form video platform, is once again in the crosshairs of regulators. The core issue? Concerns surrounding...
Black Basta and CACTUS ransomware: shared BackConnect module signals affiliate transition
Ransomware

Black Basta and CACTUS ransomware: shared BackConnect module signals affiliate transition

4 March 2025 securebulletin.com

Recent analysis has revealed a significant overlap in the tactics, techniques, and procedures (TTPs) employed by the Black Basta and...
Anubis: new ransomware threat
Ransomware

Anubis: new ransomware threat

26 February 2025 securebulletin.com

A new player has emerged in the ransomware landscape: Anubis. This group, first observed in December 2024, is quickly making...
Lazarus group’s Billion-Dollar Bybit heist: a cyber forensics analysis
Cybercrime

Lazarus group’s Billion-Dollar Bybit heist: a cyber forensics analysis

26 February 2025 securebulletin.com

The Lazarus Group, a notorious North Korean state-sponsored hacking collective, has once again demonstrated its sophistication and audacity with a...
Fog ransomware: a deep dive into its tactics and targets
Ransomware

Fog ransomware: a deep dive into its tactics and targets

14 February 2025 securebulletin.com

Okay, I can do that! Here’s a short, discursive article about Fog Ransomware based on the provided document, written in...
RedMike (Salt Typhoon) continues global Telecom attacks
Spyware

RedMike (Salt Typhoon) continues global Telecom attacks

14 February 2025 securebulletin.com

Despite widespread awareness and U.S. sanctions, the Chinese state-sponsored threat group RedMike (also known as Salt Typhoon) remains a persistent...
Students are suing to stop access to sensitive financial aid databases by Department of Government Efficiency members
Business

Students are suing to stop access to sensitive financial aid databases by Department of Government Efficiency members

8 February 2025 securebulletin.com

A recent lawsuit filed by the University of California Student Association against the U.S. Department of Education highlights significant cybersecurity...
LLMjacking: the exploitation of API keys in DeepSeek and beyond
AI

LLMjacking: the exploitation of API keys in DeepSeek and beyond

8 February 2025 securebulletin.com

The rise of LLMjacking, a sophisticated cyberattack targeting large language models (LLMs), has sparked growing concerns among enterprises relying on...
Canadian national faces charges in $65M crypto-hacking spree
Cybercrime

Canadian national faces charges in $65M crypto-hacking spree

8 February 2025 securebulletin.com

A Canadian man is facing charges related to a series of cryptocurrency hacks that siphoned off an estimated $65 million,...
The rising threat of ADFS spoofing attacks
Vulnerability

The rising threat of ADFS spoofing attacks

5 February 2025 securebulletin.com

In a recent alarming development, hackers have launched a sophisticated phishing campaign targeting Microsoft Active Directory Federation Services (ADFS) to...
Silent Lynx: a new threat actor in central Asia’s cyber landscape
Phishing

Silent Lynx: a new threat actor in central Asia’s cyber landscape

5 February 2025 securebulletin.com

In recent weeks, cybersecurity experts have identified a previously undocumented threat actor known as Silent Lynx, which has been linked...
Critical vulnerabilities in Netgear routers demand immediate attention
Vulnerability

Critical vulnerabilities in Netgear routers demand immediate attention

4 February 2025 securebulletin.com

On February 4, 2025, Netgear issued a crucial alert regarding two significant vulnerabilities impacting several of its WiFi router models....