Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • Image generated by DALL-E Internationalization is the process of making your product available in different locales for targeted audiences. The localization process should take care of translating text to respective languages, changing the date, time, and number formats, changing currencies, and many more. The first step towards any Localization is Translation. Lingui JS Lingui is an…

  • Backdoored pirated applications targets Apple macOS users

  • AI versus AI The US Government, arguably the largest network in the world, certainly understands the value of AI security policy as it seeks to leverage the promise of AI across government and military applications. In October 2023, the Whitehouse issued an executive order (EO) for safe AI development and use.

  • Game Message January 22, 2024, 07:45 Palworld never ceases to surprise. The production is selling at a crazy pace and even managed to surpass Counter-Strike 2 and Cyberpunk 2077 in terms of activity results on Steam.

  • While publicly reported and patched in October 2023, Mandiant and VMware Product Security have found UNC3886, a highly advanced China-nexus espionage group, has been exploiting CVE-2023-34048 as far back as late 2021.

  • The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance.” These new guidelines went into effect on December 18, 2023, which means 2024 will be an important year for enterprises and…

  • Cloud Security Providers for Healthcare offer specialized services to protect data and applications hosted in cloud environments. In the healthcare sector, the importance of these services is magnified due to the sensitive nature of health data and the stringent regulations governing its protection, like HIPAA in the United States.

  • In an exclusive statement to The Cyber Express team, DENHAM the Jeanmaker, the renowned denim brand founded in Amsterdam in 2008, confirmed falling victim to a cyberattack. The denim giant disclosed that the DENHAM cyberattack was first discovered on December 27, 2023.

  • The renowned American multinational fast-food chain, Subway, finds itself in an alleged cyber catastrophe. The LockBit ransomware gang has asserted responsibility for the Subway data breach, targeting the internal database, and leading to the compromise of sensitive information, including employee salaries, franchise royalty payments, master franchise commission payments, restaurant turnovers, and more.

  • Wring a simple disassembler for our VM instruction set

  • Black smoke billows over Khan Yunis in southern Gaza, the new epicentre of the war between Israel and Hamas – Copyright AFP Janis LATVELS, Nicholas SHEARMAN

  • In the digital age, where technological advancements are reshaping industries, blockchain technology has emerged as a transformative force with the potential to revolutionize various sectors. Blockchain, a decentralized and distributed ledger technology, provides a secure and transparent way of recording and verifying transactions. As organizations recognize the power of blockchain, the demand for skilled blockchain…

  • The “trust” organizers and ideologists of the WEF already “strengthened” in 2003 at their 33rd event. There was something to remember and compare with. In twenty years, a lot has changed, except for Washington’s craving for leadership and the system of international payments in dollars. “Leadership” got bigger, the dollar, however, weakened a little.

  • There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed to address it, according to the World Economic Forum.

  • CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts aiming to practice offensive security techniques safely.

  • With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and data theft to safety hazards resulting from potential system breaches.

  • Technical details and proof-of-concept (PoC) have emerged about a now-patched security flaw, CVE-2024-0517, in Google Chrome that could be exploited by threat actors to achieve remote code execution.

  • “Which Linux distro should I use?” Is a recurring question people ask without an end in sight. I have been hearing this for more than a decade at this point. So I decided to share my framework/checklist for choosing a Linux distro along with my recommendations. This way, even if my recommendation doesn’t fit someone’s…

  • Cross-browser Compatibility Test your website on different browsers; don’t stick to one specific browser. It can lead to various problems. The most common browsers nowadays are Brave, Chrome, Safari, Firefox, Microsoft Edge, etc. Make sure to test on these browsers.