Top 10 Cyber Attacks of 2024

By Guru Baran The year 2024 witnessed a surge in cyber-attacks, with incidents targeting critical infrastructure, healthcare, financial institutions, and even political campaigns. These attacks highlight the growing sophistication of threat actors and the vulnerabilities across industries. Below is a detailed list of the top 10 cyber-attacks of 2024 based on their scale, impact, and geopolitical significance. Key Takeaways from 2024 Cybersecurity Trends Healthcare Under Siege: Ransomware gangs increasingly targeted healthcare […]

read more

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

?Ravie Lakshmanan                                                                                                                                         […]

read more

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

?Ravie Lakshmanan North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. “In some instances, fraudulent workers demanded ransom payments from their former employers after gaining insider access, a tactic not observed in earlier schemes,” Secureworks […]

read more

Undercover North Korean IT workers now steal data, extort employers

By Bill Toulas North Korean IT professionals who trick Western companies into hiring them are stealing data from the organization’s network and asking for a ransom to not leak it. Dispatching IT workers to seek employment at companies in wealthier nations is a tactic that North Korea has been using for years as a means to obtain privileged access for cyberattacks or to generate revenue for the country’s weapons programs. […]

read more

RFID cards could turn into a global security mess after discovery of hardware backdoor

Poking at bad encryption practices to discover some outrageous, unexpected issues By Alfonso Maruccia August 26, 2024 at 3:16 PM WTF?! Chinese-made chips used in popular contactless cards contain hardware backdoors that are easy to exploit. These chips are compatible with the proprietary Mifare protocol developed by Philips spin-off NXP Semiconductors and are inherently “intrinsically broken,” regardless of the card’s brand. Security researchers at Quarkslab have discovered a backdoor in millions of RFID cards […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights