T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers
T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network.
This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
Top Sophisticated Cyber Security Threats of 2024
As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape.
ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
Hackers Can Exploit Windows Driver Use-After-Free Vulnerability (CVE-2024-38193) to Gain Systems Privileges
A critical use-after-free vulnerability called CVE-2024-38193 is found in the Windows driver afd.sys. It affects the Registered I/O (RIO) extension for Windows sockets and lets attachers take over the whole system remotely. The August...
Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows
In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments.
The study, conducted by Haitham S. Al-Sinani from the...
Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance
AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions.
Hundreds of security and IT professionals gathered early...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API
In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process.
This innovative tool acts as a virtual pair programmer, providing conversational...
Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data
Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant.
Brain Cipher is a ransomware group that emerged in June...
InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models
In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs).
The attack, dubbed "InputSnatch," exploits timing differences in cache-sharing mechanisms...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages.
It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
New Skimmer Malware Steals Credit Card Data From Checkout Pages
A new skimmer malware is targeting Magento-powered eCommerce websites, stealing sensitive credit card information from checkout pages.
This malware dynamically creates a false credit card form or directly extracts payment fields, activating only on checkout...