For over three years, a download site secretly served Linux users malware that stole sensitive information,…
Category: Security
PS5: SpecterDev releases sprx/self decrypter payload for all hackable firmwares – Wololo.net
SpecterDev has released a payload for all hackable PS5 Firmwares, enabling the decryption of system binaries,…
Exploit released for critical VMware SSH auth bypass vulnerability
A critical SSH authentication bypass vulnerability in VMware’s Aria Operations for Networks tool has been exposed.…
Hacking campaign bruteforces Cisco VPNs to breach networks
Hackers are exploiting Cisco Adaptive Security Appliance (ASA) SSL VPNs in credential stuffing and brute-force attacks.…
Hackers shut down 2 of the world’s most advanced telescopes
Leading astronomical observatories have suffered cyberattacks, causing temporary shutdowns. The National Science Foundation’s National Optical-Infrared Astronomy…
Multiple Notepad++ Flaws Let Attackers Execute Arbitrary Code
Several Buffer Overflow vulnerabilities have been found in Notepad++, an open-source C++-based source code editor. These…
Microsoft signing keys keep getting hijacked, to the delight of Chinese threat actors
Microsoft’s digital keys were hijacked by an unknown threat actor, identified as Carderbee by Symantec researchers,…
GTA 6 Hacker Was A Teenager On Bail In A Hotel Room Using An Amazon Fire Stick
An 18-year-old from Oxford, identified as a member of the international cyber-crime group Lapsus$, has been…
Google announces new algorithm that makes FIDO encryption safe from quantum computers
Google researchers have developed the first implementation of quantum-resistant encryption for FIDO2 security keys, a crucial…
This $70 device can spoof an Apple device and trick you into sharing your password | TechCrunch
At the Def Con hacking conference, security researcher Jae Bochs demonstrated a device that could trigger…
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
A new attack method, NoFilter, has been discovered that exploits the Windows Filtering Platform (WFP) to…
What happens when thousands of hackers try to break AI chatbots
At the 2023 Def Con hacker convention, a contest was held to test the vulnerabilities of…
LinkedIn accounts hacked in widespread hijacking campaign
LinkedIn is experiencing a surge in account hacks, with users reporting lockouts and hijackings. Cybersecurity firm…
Raspberry Pi Used To Hijack Casino Card Shuffler
Security researchers from IOActive have demonstrated how the Deckmate 2, a widely used automated card shuffling…
Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files
Claroty, an IoT and industrial cybersecurity firm, has discovered critical vulnerabilities in Western Digital (WD) and…
Microsoft Visual Studio Code flaw lets extensions steal passwords
Microsoft’s Visual Studio Code (VS Code) has a flaw that allows malicious extensions to access authentication…
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections
Hackers are increasingly exploiting the Cloudflare Tunnels feature to create covert HTTPS connections from compromised devices,…
Criminals Have Created Their Own ChatGPT Clones
Cybercriminals are reportedly developing and selling chatbots capable of generating scam emails, with systems like FraudGPT…
Virtual Prompt Injection: A Novel Threat to Language Models
A new paper from researchers at University of Southern California, Samsung Research America, and University of…