Spacelab
TECH CREATORS FESTIVALS  MUSIC
GEAR AI SOCIAL MEDIA GUIDES  

CYBER SECURITY

  BITCOIN
 
     
     
 
     
 

Cybersecurity Latest News & Guides

 
     
 

Stay updated with the latest developments in Cybersecurity!

 

News, updates tips and tutorials that help you maximize your security.

 

Check back for updates.

 

 

Latest Cybersecurity News

 

5 tips to improve your cybersecurity posture in 2025

Goodbye spreadsheets, hello automation ...

 

Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online

Thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as ...

 

Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using ...

 

 

 

ChatGPT Down Globally, Services Restored After Hours Of Outage

In a significant disruption, OpenAI's popular AI chatbot, ChatGPT, experienced a global outage on Thursday morning, leaving millions of users unable to access its...

 

Why SOC Roles Need to Evolve to Attract a New Generation

The cybersecurity industry faces a growing crisis in attracting and retaining SOC analysts.

 

iOS Facebook Messenger Group Call DoS Vulnerability Exploited Using Emoji

A newly discovered vulnerability in Facebook Messenger for iOS has revealed a critical flaw that could disrupt group calls by exploiting emoji reactions. This denial-of-service...

 

Europol Shuts Down 27 DDoS Attack Platform Providers, Admins Arrested

Law enforcement agencies worldwide have disrupted a holiday tradition of launching Distributed Denial-of-Service (DDoS) attacks in a major blow to cybercriminals. As part of Operation...

 

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep ...

 

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to ...

 

Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested

The effort, coordinated by Europol and involving 15 countries, dismantled several booter and stresser websites, including zdstresser.net, orbitalstress.net, and starkstresser.net.

 

Threat intel startup Silent Push has raised $10 million in a funding round co-led by Ten Eleven Ventures and Stepstone Group LP.

 

Sublime said the new capital was provided by IVP, Citi Ventures, Index Ventures, Decibel Partners, and Slow Ventures and brings the total raised to $93.8 million.

 

Fortinet has acquired Israeli collaboration and email security company Perception Point to expand its offering.

 

The potential for how AI may change the way we work is endless, but we are still a way off from this and careful planning and consideration is what is needed. 

 

Lookout details EagleMsgSpy, a surveillance tool used by Chinese law enforcement to collect data from Android devices.

 

Oasis Security has disclosed AuthQuake, a method for bypassing Microsoft MFA within an hour without user interaction.

 

Law enforcement agencies in 15 countries cooperated in taking down 27 websites selling DDoS-for-hire services.

 

Cleo has released patches for the exploited vulnerability and security firms have detailed the malware delivered in attacks.

 

Two vulnerabilities in the Hunk Companion and WP Query Console WordPress plugins allow attackers to backdoor websites.

 

Cupertino ships iOS 18.2 and macOS Sequoia 15.2 patches to fix data leakage, sandbox escapes and code exection vulnerabilities.


Krispy Kreme Hacked, Attackers Gain Unauthorized Access to IT Systems

While Krispy Kreme’s physical stores remain operational, online ordering—a significant revenue stream—has been ...

 

Apple Intelligence is live! iOS 18.2 is Released – What’s New!

Apple today announced the launch of iOS 18.2, iPadOS 18.2, and macOS Sequoia 15.2, featuring groundbreaking updates to Apple Intelligence, its user-friendly and privacy-first...

 

New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious activities without ....

 

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

Cybersecurity researchers have flagged a "critical" security vulnerability in Microsoft's multi-factor authentication (MFA) implementation that allows an attacker to ...

 

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

A new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are ...

 

What's in Google's Cybersecurity Forecast for 2025?

Google has released its cybersecurity forecast for 2025, and it's ....

 

 

 

Cybersecurity Guides & How-Tos

 

Cultivating a Hacker Mindset in Cybersecurity Defense

Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices.

 

Cybersecurity Best Practices

CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.

 

Online Safety + Privacy Basics

Learn how to protect yourself, your family and your home with these tips and resources

 

Cybersecurity for Business

Organizations of all sizes need to keep their data, employees and customers safe and secure. Learn how to protect your business with these resources.


Theft, Fraud + Cybercrime

Explore our collection of resources on current and emerging forms of cybercrime and illegal online activities.

 

The ROI of Security Investments: How Cybersecurity Leaders Prove It
Cyber threats are intensifying, and cybersecurity has become critical to business operations.

 

Top Cybersecurity Threats, Tools, and Practices

We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas.

 

Google Cybersecurity Certificate

Learn job-ready skills that are in-demand, like how to identify and mitigate common risks, threats, and vulnerabilities — and discover how to effectively utilize AI in cybersecurity.

 
 
 
     
     
 

 

 
 
Spacelab
A community for music festivals, creators & influencers! A music festival platform, online store and digital magazine.
 
Creative Commons Copyright, 2024. Some Rights Reserved.
Spacelab is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. MORE >
         
FESTIVALS NEWS STORE CONNECT SPACELAB
USA TECH AMAZON FACEBOOK ABOUT
CANADA CREATORS ETSY INSTAGRAM CONTACT
UK     TWITTER ADVERTISE
AUSTRALIA     RSS PRIVACY
EUROPE       ETHICS
ASIA       FTC DISCLOSURE
2024       SEARCH
2025        
COACHELLA