Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
Chrome
Malicious EditThisCookie Extension Attacking Chrome Users to Steal Data
The popular cookie management extension EditThisCookie has been the target of a malicious impersonation. Originally a trusted tool for Chrome users, EditThisCookie allowed users...
CVE/vulnerability
WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks
A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration Plugin, potentially impacting over 3 million WordPress websites.This security flaw...
Apple
iPhone Sharing the Photos by Default to Apple
A recent blog post by developer Jeff Johnson has brought to light a new feature in Apple's Photos app within the recently launched iOS...
Android
Stealthy Steganography Backdoor Attacks Target Android Apps
BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile devices. Existing backdoor attacks often suffer from limitations such...
Artificial Intelligence
The Defender vs. The Attacker Game
The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and attacker in trigger-based black-box model watermarking. They design payoff functions...
Cyber Security News
Weaponized Python Scripts Deliver New SwaetRAT Malware
The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries like `System.Reflection`, `ctypes`, and `wintypes`, enabling it to directly...
CVE/vulnerability
Windows 11 BitLocker Bypassed to Extract Encryption Keys
An attacker with physical access can abruptly restart the device and dump RAM, as analysis of this memory may reveal FVEK keys from recently...
Cyber Attack
Malicious npm Packages Stealing Developers’ Sensitive Data
Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these packages, downloaded over 1,000 times, compromised development environments and...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.