cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
Apple Removes iCloud End-to-End Encryption in the UK Following Government Pressure
Apple has made the controversial decision to no longer offer its optional iCloud end-to-end encryption feature, Advanced Data Protection (ADP), in the United Kingdom. The move follows demands from the UK government for a backdoor to access encrypted cloud data, sparking a heated debate over digital privacy, national security, and the future of encrypted communications in the country.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Hackers Target Craft CMS: CISA Confirms Code Injection Flaw Exploitation
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning about a remote code execution (RCE) vulnerability in Craft CMS that is being actively exploited in attacks. The flaw, tracked as CVE-2025-23209, is classified as high severity with a CVSS v3 score of 8.0 and affects Craft CMS versions 4 and 5.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Crypto Giant Bybit Hit by $1.46 Billion ETH Cold Wallet Heist
In a shocking cyber heist, cryptocurrency exchange Bybit has confirmed that an unknown attacker has stolen over $1.46 billion worth of cryptocurrency from one of its Ethereum (ETH) cold wallets. The incident, now regarded as the largest crypto theft in history, has sent shockwaves throughout the digital asset industry.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Why Tailored IT Support Solutions in London Are Essential for SMBs
For small and medium-sized businesses (SMBs) in London, IT support that caters to their unique needs is crucial. The idea of a "one-size-fits-all" approach to IT support is quickly becoming outdated. Businesses require flexible, efficient, and scalable solutions; only tailored IT support solutions in London can provide this.
By Cora Delara11 months ago in 01
US Telecom Networks Hacked: Chinese Cyber Spies Use Sophisticated Malware
The Chinese state-sponsored hacking group known as Salt Typhoon has been identified as using a custom utility called JumbledPath to stealthily monitor network traffic and potentially capture sensitive data. These cyberattacks have targeted major U.S. telecommunication providers, raising significant concerns about national security and data privacy.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
WinRAR's New Update Boosts Privacy by Removing Windows Metadata
Introduction WinRAR, one of the most widely used file archivers and compression tools for Windows, has just received a significant update with the release of version 7.10. This new update introduces several features aimed at improving performance, usability, and security. Among these, one of the most notable changes is the ability to strip sensitive metadata from the Mark-of-the-Web (MoTW) alternate data stream, increasing privacy for users who frequently download and share files.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Black Basta Ransomware Gang Exposed: Internal Chat Logs Leak Online
Leaked Chat Logs Expose Internal Conflict and Operations An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation. The leaked information sheds light on the gang’s internal operations, conflicts, and possible motivations behind their cybercriminal activities.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
What is Token-Based Authentication? Cover its Types, Importance, and Best Practices
Introduction As technologies continue to advance, it is crucial to have secure and stable mechanisms for authentication to protect essential data from malicious access. Token-based authentication is a technique that has proven effective in curbing security threats, chiefly because it is easy and secure.
By Anna Shipman11 months ago in 01
Beware of Fake Updates: FrigidStealer Malware Targets Mac Devices
The FakeUpdate malware campaigns are becoming increasingly complex, with two additional cybercrime groups, TA2726 and TA2727, now involved in delivering a new macOS infostealer malware called FrigidStealer. These threat actors are running campaigns that distribute malware via fake browser update notifications, affecting not only Mac users but also Windows and Android users.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Cybercriminals Use Invisible Unicode to Mask JavaScript in Phishing Attacks
A new JavaScript obfuscation technique leveraging invisible Unicode characters to represent binary values is actively being used in phishing attacks. This novel method, first disclosed in October 2024, has been quickly adopted by threat actors targeting affiliates of an American political action committee (PAC).
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Australian Fertility Services Giant Genea Hit by Security Breach
One of Australia’s largest fertility service providers, Genea, has confirmed a security breach after detecting suspicious activity on its network. The company revealed that unknown attackers had gained unauthorized access to its systems, prompting an urgent investigation to determine the extent of the breach and its potential impact on patients.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Microsoft App-V Tool Becomes New Weapon for Chinese Hackers to Avoid Detection
Introduction Cybersecurity researchers have recently uncovered a sophisticated cyber-espionage campaign conducted by the Chinese Advanced Persistent Threat (APT) group known as Mustang Panda. The group has been found leveraging Microsoft Application Virtualization Injector (MAVInject.exe) as a Living-Off-the-Land Binary (LOLBIN) to stealthily inject malicious payloads into legitimate processes, thereby bypassing antivirus detection mechanisms. This evasion technique was uncovered by security analysts at Trend Micro, who have tracked this threat actor under the codename “Earth Preta.”
By WIRE TOR - Ethical Hacking Services11 months ago in 01











