computer security

CrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity TransformationCrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity Transformation

CrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity Transformation

CrowdStrike and HCLTech, a leading global technology company, have announced a strategic partnership. This collaboration aims to enhance HCLTech's managed…

1 year ago
Hackers Transform the Raspberry Pi into an Online Anonymity ToolHackers Transform the Raspberry Pi into an Online Anonymity Tool

Hackers Transform the Raspberry Pi into an Online Anonymity Tool

A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing…

1 year ago
GoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret KeysGoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret Keys

GoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret Keys

Researchers have unveiled a new class of microarchitectural side-channel attacks that pose a severe threat to the security of Apple…

1 year ago
One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management PanelOne-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel

One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel

Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have…

1 year ago
North Korea’s Kimsuky Group Equipped to Exploit Windows Help filesNorth Korea’s Kimsuky Group Equipped to Exploit Windows Help files

North Korea’s Kimsuky Group Equipped to Exploit Windows Help files

Cybersecurity experts have uncovered a sophisticated cyber espionage campaign orchestrated by the North Korean threat actor group Kimsuky, Black Banshee,…

1 year ago
Hackers Claimed to have Breached the Israeli Nuclear Facility’s NetworksHackers Claimed to have Breached the Israeli Nuclear Facility’s Networks

Hackers Claimed to have Breached the Israeli Nuclear Facility’s Networks

An Iranian hacker group has claimed to have infiltrated the networks of the Dimona nuclear facility located in Israel's Negev…

1 year ago
GitHub’s New AI Tool that Fixes Your Code AutomaticallyGitHub’s New AI Tool that Fixes Your Code Automatically

GitHub’s New AI Tool that Fixes Your Code Automatically

GitHub has leaped application security by introducing a new feature that promises to revolutionize how developers address code vulnerabilities. The…

1 year ago
NCSC Released an Advisory to Secure Cloud-hosted SCADANCSC Released an Advisory to Secure Cloud-hosted SCADA

NCSC Released an Advisory to Secure Cloud-hosted SCADA

Operational Technology (OT) is a technology that interfaces with the physical world and includes Industrial Control Systems (ICS), Supervisory Control…

1 year ago
Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300

Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300

GlorySprout stealer, advertised on the XSS forum in early March 2024, is a C++ stealer sold for $300 with lifetime…

1 year ago
Androxgh0st Exploits SMTP Services To Extract Critical DataAndroxgh0st Exploits SMTP Services To Extract Critical Data

Androxgh0st Exploits SMTP Services To Extract Critical Data

AndroxGh0st is a malware that specifically targets Laravel applications. The malware scans and extracts login credentials linked to AWS and…

1 year ago