Securing IoT Age of 5G: Navigating New Challenges and Threats

A new era of interconnection, especially with the Internet of Things (IoT), is heralded by the spread of 5G networks. Although this provides previously unheard-of connection, it also increases the exposure of... Read more »

Hacker’s links with Pakistan Use Golang, Python, and Rust Malware on Indian Targets

Cross-platform malware developed in Python, Golang, and Rust has been connected to a fresh round of attacks against the Indian government, defense, and aerospace industries by the Pakistan-based Transparent Tribe actor. In... Read more »

During a recent MITRE cyberattack, hackers used rogue virtual machines (VMs) to avoid detection.

According to information released by the MITRE Corporation, the threat actor in the cyberattack that targeted the non-profit organization in late December 2023 used rogue virtual machines (VMs) in its VMware environment... Read more »

Experts Discover a Defect in the Replicate AI Service That Exposes Customers’ Data and Models

Cybersecurity researchers have discovered a critical security vulnerability in Replicate, a company that offers artificial intelligence (AI) as a service. This vulnerability could have given threat actors access to private AI models... Read more »

The SolarMarker Malware Develops a Multi-Tiered Infrastructure to Resist Off Takedown Attempts

The persistent threat actors behind the SolarMarker information-stealing virus have created a multi-tiered infrastructure to confound law enforcement takedown operations, fresh findings from Recorded Future suggest. “The core of SolarMarker’s operations is... Read more »

Vulnerability of “Linguistic Lumberjack” Discovered in the Well-Known Logging Program Fluent Bi

Tenable Research has found a serious memory corruption flaw in Fluent Bit, a crucial part of the architecture used to monitor numerous cloud services, known as Linguistic Lumberjack. This vulnerability might be... Read more »

Microsoft Word Decoys Used to Spread Malware Based on Nim

Decoy Word (MS Word) documents are being used as bait by a new malware infection that provides a backdoor that’s written in the Nim programming language. Researchers at Netskope Ghanashyam Satpathy while... Read more »

Bug or Feature? Hidden Web Application Vulnerabilities Uncovered

Numerous security measures make up web application security, which makes sure that a web application: operates as anticipated. cannot be used to conduct out-of-bounds operations. cannot start processes that it isn’t meant... Read more »

Qualcomm Discloses Information About Chip Vulnerabilities Used in Sophisticated Attacks

More details regarding three high-severity security vulnerabilities that the chipmaker Qualcomm claimed fell under the category of “limited, targeted exploitation” in October 2023 have been made public. The vulnerabilities are as follows – CVE-2023-33063 (CVSS... Read more »

CISA and FBI Issue Alert Regarding Double Extortion Attacks Using Rhysida Ransomware

“Observed in the ransomware-as-a-service (RaaS) model, Rhysida actors have hacked entities in education, production, both of information technology, and governments, and any ransom paid is split across the group and affiliates,” the... Read more »