In a chilling display of cyber sophistication, the Radiant Capital hack resulted in the theft of $50 million, with investigations pointing to a North Korean threat group as …
Penelope Iroko
-
-
News & ResourcesIdentity and Access Management
Microsoft Enhances NTLM Relay Attack Protections
by Penelope Iroko 2 minutes readCybersecurity threats are evolving, and staying ahead of attackers is critical. Recognizing this, Microsoft has introduced NTLM relay attack protections as default features in Exchange servers, LDAP, and …
-
News & Resources
Microsoft Prompt Injection Challenge Hackers with $10K for Prompt Injection Exploits
by Penelope Iroko 2 minutes readMicrosoft has launched a bold new initiative with its Microsoft prompt injection challenge, inviting ethical hackers to test the security of its innovative LLM-based email client. Offering up …
-
News & ResourcesIoT Security
Cisco Uncovers Unpatched Vulnerabilities in IoT Routers and BGP Tools
by Penelope Iroko 2 minutes readThe persistence of unpatched vulnerabilities in IoT routers and network tools poses a serious threat to industrial systems and internet infrastructure. Cisco Talos recently revealed that several critical …
-
News & ResourcesRansomware
Artivion Ransomware Attack Disrupts Medical Device Operations
by Penelope Iroko 2 minutes readThe Artivion ransomware attack has disrupted critical operations for the global medical device manufacturer, causing interruptions in order and shipping processes. The attack, identified on November 21, forced …
-
News & Resources
How Socks5Systemz Botnet Powers Proxy.AM with 85,000+ Devices
by Penelope Iroko 2 minutes readHave you ever wondered how cybercriminals exploit hacked devices to fuel their operations? Socks5Systemz botnet powers Proxy.AM, a controversial proxy service, which is using over 85,000 compromised systems …
-
News & Resources
Researchers Warn of Prompt Injection Risks in AI Systems
by Penelope Iroko 2 minutes readThe discovery of prompt injection risks in AI systems like DeepSeek and Anthropic’s Claude has raised serious cybersecurity concerns. Recent findings reveal how attackers could exploit vulnerabilities in …
-
News & ResourcesThe Web
Fake Video Apps Threaten Web3 Users Via Hackers Exploit
by Penelope Iroko 2 minutes readFake Video Apps Threaten Web3 Users: Cybersecurity researchers have uncovered a disturbing trend where fake video apps are threatening Web3 users. These deceptive apps are being used to …
-
CryptocurrencyNews & Resources
Ultralytics AI Library Hacked: Cryptocurrency Miner Alert
by Penelope Iroko 2 minutes readIn a shocking cybersecurity breach, Ultralytics AI Library hacked headlines are making waves after malicious versions of the popular Python package were discovered. Hackers used the compromised library …
-
News & Resources
Ethyca Data Privacy Platform Funding: $10 Million Raised
by Penelope Iroko 2 minutes readThe Ethyca data privacy platform funding has garnered significant attention after the company raised $10 million in a recent funding round. Led by Aspenwood Ventures and AVP, this …