Cyber Security
Latest about Cyber Security

U.S. bans Kaspersky and hands out sanctions to execs
By Dallin Grimm published
Antivirus company Kaspersky Labs and several subsidiaries were banned from U.S. operations on Thursday, and customers had 100 days to find an alternative. The U.S. also sanctioned 12 executives.

Intelbroker claims they hacked Apple in the same week as AMD
By Anton Shilov published
After claiming to have hacked AMD, Intelbroker says they have hacked Apple too, gaining access to internal tools source code

AMD working with law enforcement after reports of massive data breach
By Anton Shilov published
Known cybercriminal Intelbroker claims to have breached AMD and got plenty of sensitive information that is now available for sale.

Multiple ChatGPT instances work together to find and exploit security flaws
By Dallin Grimm published
Apes (or AI) together strong.

Office 2007 infosec researcher recalls panic after major bug announcement turned out to be a false positive
By Jowi Morales published
Former eEye researcher Greg Linares and team scrambled to find an Office 2007 vulnerability after their first heralded bug turned out to be a false positive.

"ShrinkLocker" ransomware uses BitLocker against you
By Dallin Grimm published
The ShrinkLocker ransomware attack uses BitLocker to encrypt corporate systems and destroy all recovery methods. The new attack is more directed at destruction than extortion.

Consumer-grade spyware found running on hotel guest PCs contains serious security flaw that lets anyone see recent screenshots
By Dallin Grimm published
Shades of Microsoft's Recall, with a dash of... major security flaw

Intel puts out security advisories for over 90 vulnerabilities
By Dallin Grimm published
Intel put out 41 security advisories this month on Patch Tuesday, including a CVSS level 10.0 vulnerability in an Intel AI software tool.

Alleged cryptojacker arrested for money laundering, $3.5 million in cloud service fraud
By Roshan Ashraf Shaikh published
'CP3O' allegedly exploited cloud computing providers by creating two companies where multiple accounts were created under respective names, and exploited benefits without paying the bills.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.