Skip to content
No results
  • About
  • Contact
  • CYBERSECURITY TECHNOLOGY BUSINESS
  • Home
  • Home
  • Login
  • Lost Password
  • My Account
  • Privacy Policy
  • Registration
  • Secy247 – Technology, Cybersecurity & Business
Secy247 – Technology, Cybersecurity & Business
Secy247 – Technology, Cybersecurity & Business
  • Cybersecurity
  • Technology
  • Business
  • How-To
  • News
  • About
  • Contact
  • Login
  • Registration
  • Privacy Policy
Sign Up
Secy247 – Technology, Cybersecurity & Business
Secy247 – Technology, Cybersecurity & Business
  • Cybersecurity, News

New Chrome Zero-Day Under Attack: Update Your Browser Immediately

Google has issued urgent security updates for its Chrome browser after confirming that a newly discovered vulnerability is already being used in real-world attacks. The flaw, identified as CVE-2026-2441, carries a high severity rating and could allow attackers to execute…

  • adesesan
  • February 16, 2026
  • Cybersecurity, Technology

Security Experts Warn of ZeroDayRAT: A Powerful Cross-Platform Phone Spy Tool

Cybersecurity researchers have uncovered a powerful new mobile spyware toolkit called ZeroDayRAT, now being sold through Telegram channels to cybercriminals worldwide. Unlike typical malware focused only on stealing data, this platform gives attackers full remote visibility into a victim’s phone,…

  • adesesan
  • February 16, 2026
  • Cybersecurity, News

New National Program Targets AI Phishing, Deepfakes, and Cyber Fraud in Lithuania

Rapid technological progress is transforming how societies function, from government services to everyday communication. But as countries digitize more of their infrastructure, new vulnerabilities emerge alongside the benefits. Lithuania, widely known for its advanced e-government systems, is now confronting that…

  • adesesan
  • February 16, 2026
  • Cybersecurity, Threats & Attacks

Why Silent Identity Abuse Is Replacing Ransomware as the Real Cybersecurity Threat

For years, ransomware encryption has been treated as the clearest warning sign of a cyberattack. Locked files, halted operations, public fallout. But new research suggests the industry may be focusing too much on visible damage while a more dangerous shift…

  • adesesan
  • February 11, 2026
  • Technology, Vulnerabilities

New Reynolds Ransomware Bundles Driver Exploit to Disable Endpoint Security

Security researchers have uncovered a new ransomware strain known as Reynolds that takes defense evasion a step further by embedding a vulnerable driver directly inside its payload. This approach allows the malware to disable endpoint security tools before encryption begins,…

  • adesesan
  • February 11, 2026
  • Cybersecurity, Threats & Attacks

North Korean IT Worker Scam Escalates With Stolen LinkedIn Identities

North Korean IT operatives are taking their remote work scams a step further. Instead of relying only on fake profiles, they are now submitting job applications using real LinkedIn accounts stolen or impersonated from legitimate professionals. According to the Security…

  • adesesan
  • February 11, 2026
  • Cybersecurity News, Vulnerabilities

Security Weekly Recap: Dormakaba Access Flaws, Vercel Phishing, and Post-Quantum Guidance

This week’s security updates weren’t defined by one major “headline hack.” Instead, they revealed something more dangerous in the long run: small missteps and quiet shifts that attackers are learning to exploit over and over. Most of the stories have…

  • adesesan
  • January 30, 2026
  • Cybersecurity

Exposed Ollama Instances Fuel New LLMjacking Marketplace, Researchers Warn

A new joint investigation from SentinelOne SentinelLABS and Censys is raising concerns about how open-source AI tools are being deployed around the world. Their findings show that AI hosting is quietly expanding into what they describe as a large, unmanaged…

  • adesesan
  • January 30, 2026
  • News, Threats & Attacks

Ivanti EPMM Zero-Day Exploited: Patch Now for CVE-2026-1281 and CVE-2026-1340

Ivanti has released emergency security updates for two critical vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) after confirming the flaws have been exploited in real-world zero-day attacks. One of the vulnerabilities has also been added to the CISA Known Exploited…

  • adesesan
  • January 30, 2026
  • Business & Strategy, Cybersecurity News

DOJ: Ex-Google Employee Stole 2,000+ AI Documents to Benefit China

A former Google engineer has been found guilty in the United States after prosecutors said he stole thousands of confidential Google files related to artificial intelligence and high-performance computing. The U.S. Department of Justice (DOJ) announced Thursday that Linwei Ding…

  • adesesan
  • January 30, 2026
  • Cybersecurity News, Uncategorized

Global Cybercrime Crackdowns (2021–2025): Arrests, Takedowns and Sanctions Surge

Cybercrime has evolved into a massive global problem, and it’s no longer limited to isolated hackers or small scams. Today’s threats range from ransomware gangs and malware networks to cyber espionage and underground marketplaces that operate across borders. As the…

  • adesesan
  • January 30, 2026
  • Cybersecurity, Threats & Attacks

China-Linked Hackers Exploit IIS Servers in Thailand and Vietnam to Run SEO Malware

Cybersecurity researchers have uncovered a fresh hacking campaign tied to a China-linked threat actor known as UAT-8099, active from late 2025 through early 2026. The operation, revealed by Cisco Talos, focused on breaking into vulnerable Microsoft Internet Information Services (IIS)…

  • adesesan
  • January 30, 2026
  • Business & Strategy, Cybersecurity

New Chrome Extension Threat: Affiliate Fraud + ChatGPT Token Theft

Cybersecurity researchers are warning users about a wave of malicious Google Chrome extensions that look harmless on the surface, but are secretly built to hijack affiliate links, scrape browser data, and steal OpenAI ChatGPT authentication tokens. The most notable example…

  • adesesan
  • January 30, 2026
  • Business, News

Who Owns TikTok Now? Silver Lake’s Role, Owners, and Biggest Investments (2026)

A) Who owns / controls Silver Lake? Silver Lake is a private equity firm, so it doesn’t have public shareholders. It is controlled by its partners (leadership team). Key leadership (owners/partners) Name Role at Silver Lake Notes Egon Durban Co-CEO…

  • adesesan
  • January 27, 2026
  • News, Vulnerabilities

GNU InetUtils telnetd Vulnerability Exploited in the Wild, GreyNoise Reports

A newly disclosed vulnerability in the GNU InetUtils telnet daemon (telnetd) has raised serious concerns after remaining unnoticed for almost 11 years. The flaw is tracked as CVE-2026-24061 and carries a CVSS score of 9.8 (Critical). It impacts GNU InetUtils…

  • adesesan
  • January 24, 2026
  • News, Top Stories

Osiris Ransomware Attack Uses Malicious Driver to Bypass Endpoint Protection

Security researchers have revealed details about a new ransomware strain named Osiris, linked to an attack against a large food service franchisee operator in Southeast Asia in November 2025. According to investigators from Symantec and VMware Carbon Black Threat Hunter…

  • adesesan
  • January 24, 2026
  • News, Technology

Microsoft: SharePoint-Based Phishing Campaign Leads to Business Email Compromise

Microsoft has issued a warning about a complex, multi-stage phishing campaign targeting organizations in the energy sector, where attackers combine adversary-in-the-middle (AitM) phishing with business email compromise (BEC) tactics to spread across multiple victims. According to Microsoft’s Defender Security Research…

  • adesesan
  • January 24, 2026
  • Cybersecurity News, Threats & Attacks

New Phishing Campaign Installs Legit RMM Software to Hijack Systems

Cybersecurity researchers are warning about a new attack campaign where threat actors are using stolen credentials to install legitimate Remote Monitoring and Management (RMM) tools, giving them stealthy and persistent remote control over victim systems. Instead of relying on traditional…

  • adesesan
  • January 24, 2026
  • News, Technology

TikTok to Store U.S. Data in Oracle Cloud Under New U.S. Security Deal

. The company said the new entity, TikTok USDS Joint Venture LLC, was formed in response to an executive order signed by U.S. President Donald Trump in September 2025. Under the agreement, TikTok’s parent company ByteDance will reduce its ownership…

  • adesesan
  • January 24, 2026
  • News, Technology

FortiGate FortiCloud SSO Bypass Exploited in New Attacks Despite Patches

Fortinet has confirmed it is working on a complete fix for a FortiGate authentication issue tied to FortiCloud SSO, after detecting new exploitation attempts — including cases where devices were already running the latest available firmware at the time of…

  • adesesan
  • January 24, 2026
Prev
1 2 3 4 5 6 7 8
Next
Copyright © 2026 - WordPress Theme by CreativeThemes