hackers

103 Articles
Hackers could exploit genomic data vulnerabilities
Tech

Hackers could exploit genomic data vulnerabilities

Credit: Pixabay/CC0 Public Domain Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking,...

US government contractor Conduent says hackers were able to steal some client files
Tech

US government contractor Conduent says hackers were able to steal some client files

Conduent has filed a new 8-K form with the SEC It noted a January 2025 breach and said some customer data was taken...

Russian hackers hit military mission in Ukraine with info-stealing malware on external drives
Tech

Russian hackers hit military mission in Ukraine with info-stealing malware on external drives

Symantec says it found GammaSteel on devices belonging to a military operation in Ukraine GammaSteel is an infostealer built by Russian cyber-outfit Gamaredon...

Hackers breach Morocco’s social security database in an unprecedented cyberattack
Tech

Hackers breach Morocco’s social security database in an unprecedented cyberattack

The logo for the Telegram messaging app is seen on a notebook screen in Munich, Germany, Oct. 17, 2022. Credit: AP Photo/Matthias Schrader,...

This critical FortiSwitch flaw allows hackers to change admins passwords, and they can even do it remotely
Tech

This critical FortiSwitch flaw allows hackers to change admins passwords, and they can even do it remotely

Fortinet found an escalation of privilege flaw in multiple versions of FortiSwitch The flaw was given a critical severity score A patch and...

Hackers go after influencers and content creators to hit followers with malware, steal data
Tech

Hackers go after influencers and content creators to hit followers with malware, steal data

Hackers are increasingly targeting social media influencers and content creators Their accounts have enormous reach, which crooks can use to deploy malware Followers...

Hackers exploit zero-day Common Log File System vulnerability to plant ransomware
Tech

Hackers exploit zero-day Common Log File System vulnerability to plant ransomware

Microsoft said it observed a threat actor known as Storm-2460 abuse a use after free flaw in Windows Common Log File System Driver...

Ancient flaw that allowed hackers to view browsing history patched by Chrome
Tech

Ancient flaw that allowed hackers to view browsing history patched by Chrome

A UX feature that helps users determine which links they visited in the past can be abused Over the years, there were multiple...

WhatsApp vulnerability that allowed hackers to share .exe files as images patched
Tech

WhatsApp vulnerability that allowed hackers to share .exe files as images patched

Meta found a vulnerability in WhatsApp for Windows It affects all older versions and allows hackers to trick people into running .exe files...