Fedora KDE Plasma Desktop 44 brings Plasma 6.6.4 with new accessibility features, customizable themes, and a revamped installer. Also includes DNF5 backend and Qualcomm support.
Fedora Asahi Remix 44 brings Fedora Linux 44 to Apple Silicon Macs with KDE Plasma 6.6, GNOME 50, retired vendored Mesa, and improved setup.
Iran-backed Handala group claims wiper attack on medical tech firm Stryker, wiping 200k systems across 79 countries, forcing 5,000 workers in Ireland to evacuate.
U.S., Canadian, and German authorities dismantled four IoT botnets infecting 3M+ devices behind record DDoS attacks and extortion. Key facts on Aisuru, Kimwolf, JackSkid, Mossad.
CanisterWorm: TeamPCP's wiper targets Iran via cloud exploits, supply chain attack, and blockchain-based C2. 7 key facts explained.
10 revelations about Daniil Shchukin, Russian mastermind behind GandCrab and REvil ransomware, identified by German authorities after years of anonymity.
Russia's GRU-linked hackers exploited old routers to steal Microsoft OAuth tokens, compromising 18,000+ networks via DNS hijacking without malware.
Cybercriminal Tyler 'Tylerb' Buchanan pleads guilty to wire fraud and identity theft as a senior Scattered Spider member, involved in SMS phishing and SIM-swapping that stole millions in crypto. Faces over 20 years in prison.
A DDoS protection firm's compromise turned its infrastructure into a botnet, launching years of attacks on Brazilian ISPs via DNS amplification.
Seven marketing lessons from Julia Huang's three-decade success leading an award-winning Asian American ad agency, starting with a pivotal question shift from selling to serving.
Enterprise admins targeted by EtherRAT malware via fake GitHub tools; Atos TRC warns of highly sophisticated campaign using SEO poisoning.
Researchers uncover DEEP#DOOR Python backdoor that steals browser and cloud credentials via tunneling, evading detection.
Fake cell towers, OpenEMR flaws, 600K Roblox hacks—a wave of cyberattacks hits SMS, healthcare, and gaming. Experts urge immediate patching and 2FA.
PyTorch Lightning and Intercom-client Python packages compromised in supply chain attack for credential theft. Versions 2.6.2/2.6.3 affected. Rotate credentials immediately.
Attack uses sleeper Ruby gems and Go modules to steal credentials, tamper with GitHub Actions, and maintain SSH persistence.
Two cybersecurity professionals sentenced to 4 years for deploying BlackCat ransomware. DOJ sends warning to technical facilitators. $1.2M restitution ordered.
MSPs lose millions in cybersecurity revenue due to five core sales gaps. Analysis urges alignment, pricing reform, and trust-building to capture surging market.
State-sponsored SHADOW-EARTH-053 hackers target Asian governments, NATO ally, journalists, and activists in a coordinated cyber espionage campaign, revealed by Trend Micro.
Two cybercrime clusters, Cordial Spider and Snarky Spider, use vishing and SSO abuse to extort enterprises in rapid SaaS attacks, experts warn.
Vietnamese-linked hackers used Google AppSheet to phish 30,000 Facebook accounts, selling them on an illicit storefront. Guardio's AccountDumpling campaign highlights abuse of trusted platforms.