Critical Flaw in Intel Processors Endangers Numerous Devices
New vulnerability found in Intel Core processors. Impacts Lenovo ThinkPad X1 Carbon and X1 Yoga devices. High severity rating and…
RansomHub Targets ESXi Systems with New Linux Variant
RansomHub targets ESXi systems with a new Linux variant. 90% commission rate attracts experienced affiliates, causing rapid spread. Organizations need…
CDK Cyberattack Cripples US Car Dealerships
Cyberattack on CDK Global disrupts over half of US dealerships. Dealerships resort to manual methods due to system outages. Experts…
London Hospitals Under Siege: Cyber-Attack Exposes Sensitive Data
Cyber-attack on Synnovis exposes sensitive patient and financial data. Healthcare services in London severely disrupted, with over 1,000 operations postponed.…
Hackers Use Facebook to Steal Your Passwords
Hackers use Facebook’s mechanisms for phishing. Fake notifications threaten business accounts. Robust security measures can protect accounts.
Hackers Master New Tunneling Technique to Evade Detection
ExCobalt uses GoRed for covert C2 communication. GoRed employs DNS and ICMP tunneling techniques. Advanced security measures are crucial to…
Hackers Exploit Weak Passwords in Just an Hour
Researchers revealed 59% of passwords are crackable within an hour. Modern GPUs drastically enhance the efficiency of password cracking. Human…
U.S. Blocks Kaspersky Antivirus Over Security Risks
The U.S. bans Kaspersky antivirus over security concerns. The prohibition includes new agreements and software updates. Kaspersky plans to explore…
Chinese Hackers Breach Asian Telecom Operators Using Advanced Tools
Attackers breached multiple Asian telecom operators since at least 2021. Backdoors deployed by Chinese groups included Coolclient, Quickheal, and Rainy…
Hunt Researchers Expose Tools Targeting Taiwanese Infrastructure
Hunt team exposed a web server targeting Taiwan’s government infrastructure. Tools like Nmap, SQLMap, and BlueShell were utilized by the…