Recent Security News

  • New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks

    November 13, 2023 at 12:12AM Cybersecurity researchers have identified a new version of a wiper malware called BiBi-Windows Wiper, which targets Windows systems. This variant is an expansion of the previous BiBi-Linux wiper used in cyber attacks against Israel during the recent Israel-Hamas war. The malware overwrites data in the C:\Users directory with junk data…

    Read More

  • Australia declares ‘nationally significant cyber incident’ after port attack

    November 12, 2023 at 07:50PM Australia’s National Cyber Security Coordinator has labeled an attack on DP World, a logistics company, as a “nationally significant cyber incident.” The attack caused DP World’s technology infrastructure at four Australian ports to go offline, resulting in the closure of the facilities. DP World handles 40 percent of the containers…

    Read More

  • LockBit ransomware leaks gigabytes of Boeing data

    November 12, 2023 at 06:56PM LockBit ransomware has leaked more than 43GB of files stolen from Boeing after the aerospace company refused to pay the ransom. The leaked data includes backups for various systems, with the most recent files dated October 22. LockBit had warned Boeing about the leak and threatened to publish a sample…

    Read More

  • Windows 11 will soon let you uninstall more inbox apps

    November 12, 2023 at 06:48PM Microsoft is rolling out an update for Windows 11 that allows users to uninstall a wider range of pre-installed apps, such as Camera, Cortana, Photos, People, and Remote Desktop. This addresses a common request from users who want more control over their operating system. The update aims to provide a…

    Read More

  • Iranian hackers launch malware attacks on Israel’s tech sector

    November 12, 2023 at 10:37AM Imperial Kitten, a threat actor linked to the Iranian Armed Forces, has been conducting cyberattacks since 2017. Recently, they targeted transportation, logistics, and technology firms using phishing emails with malicious attachments. They gained network access, moved laterally, and communicated with a command and control server using custom malware. Previously, they…

    Read More