New Forensic Technique Reveals Hidden Traces Left by Hackers Exploiting Remote Desktop Protocol

New Forensic Technique Reveals Hidden Traces Left by Hackers Exploiting Remote Desktop Protocol

A groundbreaking forensic methodology is revolutionizing the way cybersecurity professionals investigate attacks leveraging Microsoft’s Remote Desktop Protocol (RDP). This innovative approach allows investigators to reconstruct hacker activity—even when conventional evidence has been deleted—by extracting and analyzing overlooked digital artifacts generated during RDP sessions.
India’s CBI dismantles sophisticated cybercrime syndicate responsible for tech support scams targeting United Kingdom and Australia.

India’s CBI dismantles sophisticated cybercrime syndicate responsible for tech support scams targeting United Kingdom and Australia.

In a significant victory against international cybercrime, India’s Central Bureau of Investigation (CBI) has announced the successful dismantling of a sophisticated transnational cybercrime syndicate responsible for orchestrating large-scale tech support scams targeting citizens in the United Kingdom and Australia.
Hackers targeting Southeast Asia are using a previously undocumented Windows backdoor called HazyBeacon.

Hackers targeting Southeast Asia are using a previously undocumented Windows backdoor called HazyBeacon.

Government agencies across Southeast Asia have become the focus of a sophisticated cyber-espionage campaign, according to recent threat intelligence reports. The campaign, attributed to an advanced threat group tracked as CL-STA-1020, employs a previously undocumented Windows backdoor dubbed HazyBeacon and leverages innovative methods to evade detection, raising new concerns about the security of cloud-based infrastructure.
A computer hacking talking on a cellphone

Critical vulnerabilities found in Kigen’s eSIM (embedded SIM) technology, impacting billions of smartphones and IoT devices.

Security researchers have uncovered critical vulnerabilities in Kigen’s eSIM (embedded SIM) technology, raising concerns over the security of more than two billion devices worldwide. The flaws, which impact smartphones and a vast array of Internet of Things (IoT) products, could enable attackers to remotely compromise devices, intercept private communications, and steal sensitive subscriber data.
The official X/Twitter Sesame Street Elmo account was hacked. Elmo starts spewing antisemitic messages and calls Trump a Child F*****R”.

The official X/Twitter Sesame Street Elmo account was hacked. Elmo starts spewing antisemitic messages and calls Trump a Child F*****R”.

The official X (formerly Twitter) account of Elmo, the iconic Sesame Street character, was compromised over the weekend, resulting in the publication of a series of highly offensive and antisemitic messages. The incident has raised serious concerns about social media security and the vulnerability of high-profile accounts.
Newly Discovered SMM Vulnerabilities in Gigabyte motherboard UEFI Firmware

Newly Discovered SMM Vulnerabilities in Gigabyte motherboard UEFI Firmware

Recent security research has revealed a series of critical vulnerabilities in Gigabyte motherboard firmware. Cybersecurity experts disclosed four severe vulnerabilities (CVE-2025-7026 through CVE-2025-7029) within the System Management Mode (SMM) components of Gigabyte’s UEFI firmware. SMM operates at a privilege level beneath the operating system, making it an attractive target for attackers seeking stealthy, persistent access.
Google Gemini can be exploited through indirect prompt injection to allow embedding of malicious content that directs users to phishing sites.

Google Gemini can be exploited through indirect prompt injection to allow embedding of malicious content that directs users to phishing sites.

Google Gemini for Workspace can be exploited through a technique called indirect prompt injection. This allows attackers to manipulate Gemini’s email summaries, making them appear legitimate while embedding malicious instructions or warnings that direct users to phishing sites—without using traditional attachments or direct links.
14 arrested for defrauding the UK government of 47 million in a sophisticated phishing attack.

14 arrested for defrauding the UK government of 47 million in a sophisticated phishing attack.

A coordinated international law enforcement operation has led to the arrest of 14 individuals suspected of orchestrating a sophisticated phishing attack that defrauded the UK government of an estimated £47 million. The large-scale scam, which targeted His Majesty’s Revenue and Customs (HMRC), compromised over 100,000 taxpayer accounts and stands as one of the most significant tax-related cybercrimes in recent UK history.
Computer hacker holding a video game controller

DOJ seizes several high-profile online marketplaces for distributing pirated video games.

The Department of Justice (DOJ) and the FBI’s Atlanta Field Office have announced the successful seizure and dismantling of several high-profile online marketplaces responsible for distributing pirated video games. This coordinated operation marks a significant victory in the ongoing fight against digital piracy and intellectual property theft.