Hackers Can Use HDMI Cables to Capture Your Passwords

Security researchers have discovered a new way that hackers can steal sensitive information, like passwords. This involves eavesdropping on HDMI cables, a concerning development for computer users. The technique, detailed in a recent study by researchers at Universidad de la República in Uruguay, uses artificial intelligence to decode electromagnetic emissions from HDMI connections and reconstruct […]

Continue reading


Cybersecurity in clinical trials: safeguarding patient data against digital breaches

According to the HIPAA Journal, healthcare data breaches hit an all-time high in 2023, with over 133 million patient records breached. That’s more than double the total recorded in 2022. Accelerated by the transition from in-person to virtual care during the COVID-19 pandemic, clinical trials are especially vulnerable to cyber-attacks due to the quantities of […]

Continue reading


Disney’s internal communications leaked online after hack, WSJ reports

July 15 (Reuters) – Data from Walt Disney’s (DIS.N), opens new tab internal Slack workplace collaboration system have been leaked online, including those related to ad campaigns, studio technology and interview candidates, the Wall Street Journal reported on Monday. Hacking group NullBulge published data from thousands of Slack channels at the entertainment giant including computer […]

Continue reading


Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access. That’s according to independent findings from cybersecurity firms Check Point and Sekoia, which have codenamed […]

Continue reading


Traditional cybersecurity measures are no longer enough

Traditional cybersecurity measures are no longer sufficient to defend against sophisticated attacks, particularly those powered by artificial intelligence (AI). Threat actors are constantly innovating and exploiting vulnerabilities in interconnected digital environments, including cloud-based infrastructures and remote work setups. Regulatory requirements and customer expectations on data privacy and protection continue to evolve, driving the need for […]

Continue reading