computer security

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to challenges in reverse engineering DRAM addressing,…

10 months ago

Hackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator Code

A malicious software known as EagleSpy Android RAT (Remote Access Trojan) 3.0 has been shared on a notorious online forum…

10 months ago

CrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity Transformation

CrowdStrike and HCLTech, a leading global technology company, have announced a strategic partnership. This collaboration aims to enhance HCLTech's managed…

10 months ago

Hackers Transform the Raspberry Pi into an Online Anonymity Tool

A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing…

10 months ago

GoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret Keys

Researchers have unveiled a new class of microarchitectural side-channel attacks that pose a severe threat to the security of Apple…

10 months ago

One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel

Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have…

10 months ago

North Korea’s Kimsuky Group Equipped to Exploit Windows Help files

Cybersecurity experts have uncovered a sophisticated cyber espionage campaign orchestrated by the North Korean threat actor group Kimsuky, Black Banshee,…

10 months ago

Hackers Claimed to have Breached the Israeli Nuclear Facility’s Networks

An Iranian hacker group has claimed to have infiltrated the networks of the Dimona nuclear facility located in Israel's Negev…

10 months ago

GitHub’s New AI Tool that Fixes Your Code Automatically

GitHub has leaped application security by introducing a new feature that promises to revolutionize how developers address code vulnerabilities. The…

10 months ago

NCSC Released an Advisory to Secure Cloud-hosted SCADA

Operational Technology (OT) is a technology that interfaces with the physical world and includes Industrial Control Systems (ICS), Supervisory Control…

10 months ago