A new era of interconnection, especially with the Internet of Things (IoT), is heralded by the spread of 5G networks. Although this provides previously unheard-of connection, it also increases the exposure of... Read more »
Cross-platform malware developed in Python, Golang, and Rust has been connected to a fresh round of attacks against the Indian government, defense, and aerospace industries by the Pakistan-based Transparent Tribe actor. In... Read more »
According to information released by the MITRE Corporation, the threat actor in the cyberattack that targeted the non-profit organization in late December 2023 used rogue virtual machines (VMs) in its VMware environment... Read more »
Cybersecurity researchers have discovered a critical security vulnerability in Replicate, a company that offers artificial intelligence (AI) as a service. This vulnerability could have given threat actors access to private AI models... Read more »
The persistent threat actors behind the SolarMarker information-stealing virus have created a multi-tiered infrastructure to confound law enforcement takedown operations, fresh findings from Recorded Future suggest. “The core of SolarMarker’s operations is... Read more »
Tenable Research has found a serious memory corruption flaw in Fluent Bit, a crucial part of the architecture used to monitor numerous cloud services, known as Linguistic Lumberjack. This vulnerability might be... Read more »
Decoy Word (MS Word) documents are being used as bait by a new malware infection that provides a backdoor that’s written in the Nim programming language. Researchers at Netskope Ghanashyam Satpathy while... Read more »
Numerous security measures make up web application security, which makes sure that a web application: operates as anticipated. cannot be used to conduct out-of-bounds operations. cannot start processes that it isn’t meant... Read more »
More details regarding three high-severity security vulnerabilities that the chipmaker Qualcomm claimed fell under the category of “limited, targeted exploitation” in October 2023 have been made public. The vulnerabilities are as follows – CVE-2023-33063 (CVSS... Read more »
“Observed in the ransomware-as-a-service (RaaS) model, Rhysida actors have hacked entities in education, production, both of information technology, and governments, and any ransom paid is split across the group and affiliates,” the... Read more »