Dutch Privacy Watchdog Fines Clearview AI $34 Million for ‘Illegal’ Database of Faces

The Dutch Data Protection Authority (Dutch DPA) fined Clearview AI $34 million for the illegal creation of a facial image database. If Clearview AI does not comply, an additional fine of up to $5.5 million will be imposed.

Cyware News – Latest Cyber News – ​Read More

North Korean Hackers Targets Job Seekers with Fake FreeConference App

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part of an ongoing financially-driven campaign dubbed Contagious Interview.
The new attack wave, spotted by Singaporean company Group-IB in mid-August 2024, is yet another indication that the activity is also leveraging native installers for

The Hacker News – ​Read More

FBI: North Korean Actors Readying Aggressive Cyberattack Wave

Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.

darkreading – ​Read More

Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion

The highly obfuscated KTLVdoor malware has versions for both Microsoft Windows and Linux, allowing attackers to perform tasks like file manipulation, command execution, and remote port scanning.

Cyware News – Latest Cyber News – ​Read More

Iran Cyber Attack: Fox Kitten Facilitates Ransomware in US

Read more about an attack campaign led by Iran-based cyberespionage threat actor Fox Kitten, and learn how to protect your company from this threat.

Security | TechRepublic – ​Read More

VMware Fixed a Code Execution Flaw in Fusion Hypervisor

VMware has patched a high-severity code execution flaw in its Fusion hypervisor. The vulnerability, tracked as CVE-2024-38811, is caused by an insecure environment variable.

Cyware News – Latest Cyber News – ​Read More

Emansrepo Stealer: Multi-Vector Attack Chains

The Python-based infostealer collects user information, text files, PDF files, browser data, crypto wallets, game platforms, browser extensions, and cookies. The stolen data is sent via email to the attacker.

Cyware News – Latest Cyber News – ​Read More

How Ransomware Groups Weaponize Stolen Data

Ransomware groups are increasingly weaponizing stolen data to pressure victims into paying. They analyze data to maximize damage and create opportunities for extortion, targeting business leaders and employees for blame.

Cyware News – Latest Cyber News – ​Read More

Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch

Google has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild.
The high-severity vulnerability, tracked as CVE-2024-32896 (CVSS score: 7.8), relates to a case of privilege escalation in the Android Framework component.
According to the description of the bug in the NIST National

The Hacker News – ​Read More

500,000 tokens: How Anthropic’s Claude Enterprise is pushing AI boundaries

Anthropic launches Claude Enterprise, transforming AI for businesses with a 500,000 token context window, advanced security, and GitHub integration, challenging OpenAI and Google in the enterprise market.Read More

Security News | VentureBeat – ​Read More