Month: August 2022

Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack. Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, CCleaner, Microsoft Edge, Steam, Zoom, and WhatsApp, an analysis from VirusTotal has revealed. “One
0 Comments
An underwater volcano that erupted in the South Pacific near Tonga on January 15 this year causing a catastrophe in the archipelago. The Tonga-Hunga Ha’apai eruption also triggered an earthquake and tsunami that flooded the country. A new study indicates that during this event, the volcano spewed not just ash into the atmosphere but also a
0 Comments
In what can prove to be substantial to the treatment of handling disorders related to drug abuse, scientists have discovered a new brain mechanism. The study, which was based on cocaine-seeking in rats, discovered that inhibiting certain acetylcholine receptors made it more difficult to resist cocaine-seeking urges. These receptors are located in the lateral habenula
0 Comments
A new, large-scale phishing campaign has been observed using adversary-in-the-middle (AitM) techniques to get around security protections and compromise enterprise email accounts. “It uses an adversary-in-the-middle (AitM) attack technique capable of bypassing multi-factor authentication,” Zscaler researchers Sudeep Singh and Jagadeeswar Ramanukolanu said in a Tuesday report. “The campaign is specifically designed to reach end users
0 Comments
Samsung has finally launched its self-repair programme for the US market after announcing the initiative back in March. The South Korean electronics giant had announced the programme earlier this year in collaboration with leading online repair community iFixit. For now, only a handful of Samsung devices will be supported by this programme and this short
0 Comments
Digital attacks against Taiwanese government websites ahead of US House of Representatives Speaker Nancy Pelosi’s arrival in Taipei on Tuesday were likely launched by Chinese activist hackers, or “hacktivists,” a cybersecurity research organisation said. The website of Taiwan’s presidential office was targeted by a distributed denial of service (DDoS) attack on Tuesday and was at one point
0 Comments
Security researchers have discovered a new vulnerability called ParseThru affecting Golang-based applications that could be abused to gain unauthorized access to cloud-based applications. “The newly discovered vulnerability allows a threat actor to bypass validations under certain conditions, as a result of the use of unsafe URL parsing methods built in the language,” Israeli cybersecurity firm
0 Comments
Researchers have disclosed a new offensive framework called Manjusaka that they call a “Chinese sibling of Sliver and Cobalt Strike.” “A fully functional version of the command-and-control (C2), written in GoLang with a User Interface in Simplified Chinese, is freely available and can generate new implants with custom configurations with ease, increasing the likelihood of
0 Comments
Developing a method to observe the movement of atoms in a liquid, scientists from the University of Manchester have captured — for the first time — images of single atoms swimming in liquid. When a solid and a liquid come in contact with each other, both substances tend to change their configuration. This solid-liquid atomic-scale interaction governs the behaviour
0 Comments