Securing IoT Age of 5G: Navigating New Challenges and Threats

A new era of interconnection, especially with the Internet of Things (IoT), is heralded by the spread of 5G networks. Although this provides previously unheard-of connection, it also increases the exposure of... Read more »

Cyber Security Breach: alleged penetration of Israeli’s nuclear site computer network by Iranian hackers

We all know the ongoing situation between Israel and Iran, the two nations’ lengthy history of cyberattacks against one another could be relevant when Israel considers taking revenge for Iran’s attack. In... Read more »

Hacker’s links with Pakistan Use Golang, Python, and Rust Malware on Indian Targets

Cross-platform malware developed in Python, Golang, and Rust has been connected to a fresh round of attacks against the Indian government, defense, and aerospace industries by the Pakistan-based Transparent Tribe actor. In... Read more »

During a recent MITRE cyberattack, hackers used rogue virtual machines (VMs) to avoid detection.

According to information released by the MITRE Corporation, the threat actor in the cyberattack that targeted the non-profit organization in late December 2023 used rogue virtual machines (VMs) in its VMware environment... Read more »

Experts Discover a Defect in the Replicate AI Service That Exposes Customers’ Data and Models

Cybersecurity researchers have discovered a critical security vulnerability in Replicate, a company that offers artificial intelligence (AI) as a service. This vulnerability could have given threat actors access to private AI models... Read more »

The SolarMarker Malware Develops a Multi-Tiered Infrastructure to Resist Off Takedown Attempts

The persistent threat actors behind the SolarMarker information-stealing virus have created a multi-tiered infrastructure to confound law enforcement takedown operations, fresh findings from Recorded Future suggest. “The core of SolarMarker’s operations is... Read more »

Vulnerability of “Linguistic Lumberjack” Discovered in the Well-Known Logging Program Fluent Bi

Tenable Research has found a serious memory corruption flaw in Fluent Bit, a crucial part of the architecture used to monitor numerous cloud services, known as Linguistic Lumberjack. This vulnerability might be... Read more »