C2 Tracker: A Community-Driven IOC Feed for Cybersecurity
In the ever-evolving landscape of cybersecurity threats, having access to reliable and up-to-date threat intelligence is paramount. One tool that has gained recognition in the cybersecurity community...
View ArticleCISA Warns of Actively Exploited Microsoft COM for Windows Flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning about a Microsoft COM for Windows vulnerability, CVE-2018-0824, which is currently being exploited by...
View ArticleTikTok Faces Civil Lawsuit for COPPA Violations, Millions of Children Affected
The U.S. Department of Justice, in conjunction with the Federal Trade Commission (FTC), has initiated a civil lawsuit against the popular app TikTok and its Chinese parent company ByteDance....
View ArticleReal-Time Deepfakes Unveiled at DEF CON: Be Prepared to Be Shocked
At the upcoming DEF CON hacker conference in Las Vegas, attendees will be treated to a unique opportunity. Brandon Kovacs, a senior specialist at Bishop Fox, will demonstrate how easily deepfake videos...
View ArticleProtecting Malaysians’ Data: New Breach Notification System in Place
Malaysia is introducing a new data breach notification system aimed at prompt response and mitigation of cybersecurity incidents. This was announced by Malaysia’s Deputy Minister of Communications, Teo...
View ArticleGoogle’s Billion-Dollar Apple Search Deal Deemed Illegal
The U.S. regulatory body’s antitrust case against Google has recently seen significant developments. A U.S. federal judge has ruled that Google’s monopolistic dominance in the search and advertising...
View ArticleCVE-2024-22169: Western Digital’s WD Discovery App Exposed to Code Execution...
Western Digital, a leading provider of storage solutions, has issued a security advisory regarding a vulnerability (CVE-2024-22169, CVSS 7.1) discovered in their WD Discovery Desktop App. This flaw...
View ArticleSamsung Boosts Bug Bounty Program: $1 Million Top Prize for Mobile...
In a move to fortify its mobile security, Samsung has significantly increased the rewards for its ‘Important Scenario Vulnerability Program’. The tech giant is now offering up to a staggering $1...
View ArticleGoogle Chrome Update Fixes Critical Code Execution Vulnerability (CVE-2024-7532)
Google has released a critical security update for its Chrome web browser on the Stable channel, addressing five vulnerabilities, one of which is rated as critical. The update, versions...
View ArticleWarning: Fake WinRar Websites Distributing Malware
SonicWall has recently issued a cybersecurity alert about a deceptive website that mimics the official WinRar site. This fake site, win-rar.co, not only closely resembles the legitimate WinRar site but...
View ArticleChameleon Banking Trojan Targets Hospitality Sector with Novel CRM Masquerade
In July 2024, analysts at ThreatFabric Mobile Threat Intelligence observed new campaigns from Chameleon, a notorious Banking Trojan first discovered in December 2022. These recent campaigns have...
View ArticleLeaked Documents Reveal NVIDIA’s Secret AI Training Practices
NVIDIA has used videos from YouTube and other sources to train its AI products, as revealed by internal communications and documents obtained by 404 Media. When discussing the legal and ethical aspects...
View ArticlePython Popularity Soars: Nearing Java’s Record in TIOBE Index
In August 2024, the Python programming language reached a new milestone in the TIOBE index, surpassing 18% popularity for the first time. The last time a similar achievement was made was by Java in......
View ArticleDeepfence ThreatMapper: Comprehensive Threat Management for Cloud-Native...
As organizations increasingly embrace cloud-native architectures, the attack surface expands, and the need for robust security measures becomes paramount. Traditional security tools often fall short in...
View ArticleCVE-2024-37287 (CVSS 9.9): Urgent Kibana Patch for Severe Security Vulnerability
The Elastic Team has announced a critical security update for Kibana, their popular open-source data visualization and exploration tool. This update addresses a severe vulnerability, CVE-2024-37287,...
View ArticleLinux Kernel Vulnerability CVE-2023-6817: Researcher Unveils Exploit Code
In a recent disclosure, a security researcher has published detailed technical insights and proof-of-concept exploit code for a critical vulnerability in the Linux kernel, identified as CVE-2023-6817....
View ArticlemacOS Sequoia’s New Security Measures: A Boost for User Privacy or Annoyance?
Apple has indeed placed a significant emphasis on privacy and security. The forthcoming macOS Sequoia version reveals a new security strategy: permissions for third-party screenshot and screen...
View ArticleXiaomi Prioritizes Privacy: HyperOS 2.0 to Detect Hidden Cameras
Xiaomi is poised to launch Xiaomi HyperOS version 2.0, which is rumored to include a new feature to help users protect their privacy by detecting unknown, hidden cameras within a local network. In...
View ArticleSecurity Boost: Apple Strengthens Gatekeeper Protections in macOS Sequoia
macOS Sequoia implements an automatic reset of permissions for screenshot and screen recording software upon each system reboot and weekly. Users must reauthorize these tools each time they need to use...
View ArticleData Centers Alert: AMD Addresses SEV-SNP Vulnerabilities in EPYC Processors
AMD has released a security bulletin addressing three potential vulnerabilities in its Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP) technology. Discovered by a researcher, these...
View Article