-
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges
Reflecting on 2024, it has been an eventful year for the Zero Day Initiative Threat Hunting team. Throughout the year, we identified numerous threat actor campaigns exploiting zero-day vulnerabilities, uncovered additional variants of these vulnerabilities, and discovered even more vulnerabilities through our in-the-wild research. In this blog, we will highlight some of the key achievements…
-
Samsung’s new Odyssey gaming monitors require a monster PC build
Samsung unveiled some ultra powerful gaming monitors at CES 2025 The Consumer Electronics Show (CES) in Las Vegas is where some of the largest names in tech gather to announce the technologies and products that will define next year’s product cycles. Against that backdrop, CES is also well-known for outrageous product releases not exactly aimed…
-
Ivanti warns hackers are exploiting new vulnerability
The company released an advisory and a corresponding blog about two bugs — CVE-2025-0282 and CVE-2025-0283 — and warned that some customers have already seen CVE-2025-0282 exploited in their environments. Go to Source
-
Pall Mall Process to tackle commercial hacking proliferation raises more concerns than solutions
An initiative spearheaded by France and the U.K. last year to tackle commercial spyware has experienced setbacks and significant gaps, according to participants. Go to Source
-
Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian hackers
In a statement on the Russian social media platform VKontakte, the St. Petersburg-based company said the “planned” attack “destroyed” its infrastructure overnight. Nodex added that it was working to restore systems from backups but could not provide a timeline for when operations would fully resume. Go to Source
-
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
How useful are Generative AI technologies when it comes to being used in a security context? We have taken the plunge and gave it a try. Go to Source
-
US sanctions prominent Chinese cyber company for role in Flax Typhoon attacks
The Treasury Department said Integrity Technology provided Flax Typhoon actors with infrastructure between the summer of 2022 and fall of 2023 — with the state-backed groups sharing and receiving information from the company. Go to Source
-
Help Wanted: Data Scientists In The Cybersecurity Field
This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Medium Story Sausalito, Calif. – Jan. 7, 2025 Data science technology is about to revolutionize even the most traditional industries as it uses AI, Machine Learning, and Big Data, according to a story in Medium. Total global data storage is projected to exceed…
-
IHAK: Capture Sector Growth In Cybersecurity
This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Seeking Alpha Story Sausalito, Calif. – Jan. 3, 2025 Cybercrime costs are rising. According to Cybersecurity Ventures, it is expected to reach $10.5 trillion annually by 2025, making cybersecurity a crucial investment sector. iShares Cybersecurity and Tech ETF (IHAK) offers a diversified portfolio of…