Cyber Security
Latest about Cyber Security

Multi-platform spyware provider Spytech gets hacked, revealing global scale of operations and swaths of unencrypted victim data
By Christopher Harper published
A Spytech breach disclosed to TechCrunch prompts an exposé.

AI can snoop on your computer screen using signals leaking from HDMI cables
By Jeff Butts published
A research team in Uruguay has outlined how savvy and well-equipped hackers could intercept leaked signals from your monitor cable and snoop on your display.

Secretive network exploits GitHub to spread malware and phishing links from 3,000 shadow accounts
By Jeff Butts published
Cyber security researchers have identified a massive network of "ghost" accounts on GitHub proliferating malware and phishing links.

Patched Microsoft Defender flaw still being used to deliver information-stealing malware to vulnerable machines
By Jeff Butts published
Despite the security vulnerability being patched in February, hackers are still finding out-of-date servers and workstations to exploit the hole and steal data.

Zotac server misconfig exposed customer info on Google
By Jeff Butts published
Because of an apparent server misconfiguration, a massive data leak of customer information was readily available through a simple Google search.

Biggest password database posted in history spills 10 billion passwords
By Christopher Harper published
The RockYou2024 leak compiles 9,948,575,739 unique passwords in one place.

Indonesia gov ransomware chaos may be over after hack group apologizes and says it has shared decrypt keys
By Jowi Morales published
Brain Cipher group, which was behind the massive ransomware attack on the Indonesian government, released the decrypt keys and apologized publicly for its actions.

Indonesia, suffering from a ransomware attack, discovers it has no backups — 'That's stupidity,' remarks astute government official
By Jeff Butts published
The devastation from a June cyberattack against Indonesia has been made much worse by a complete lack of data backups from one of the compromised data centers.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.