Month: March 2024

Mar 28, 2024NewsroomHardware Security / Vulnerability Cybersecurity researchers from ETH Zurich have developed a new variant of the RowHammer DRAM (dynamic random-access memory) attack that, for the first time, successfully works against AMD Zen 2 and Zen 3 systems despite mitigations such as Target Row Refresh (TRR). “This result proves that AMD systems are equally
0 Comments
Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. It said “new project creation and new user registration” was temporarily halted to mitigate what it said was a “malware
0 Comments
Poco has been delivering decent products for a while, mainly catering to diverse price categories. The X-series offers flagship-grade features, while the M-series delivers a punch in the mainstream category. However, it is the C-series that provides the real value-for-money proposition. The latest addition to this series is the Poco C61, which brings a refreshed
0 Comments
Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only when necessary, usually once a year for their compliance requirements. This manual approach often misses opportunities
0 Comments
Mar 30, 2024NewsroomLinux / Supply Chain Attack RedHat on Friday released an “urgent security alert” warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score
0 Comments
Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims’ Macs, but operate with the end goal of stealing sensitive data, Jamf
0 Comments
Google is reportedly expanding the testing for its Search Generative Experience (SGE) feature which was announced in May 2023. The feature works using generative artificial intelligence (AI) and once a query has been searched, it creates a snapshot of the key information around the keywords. The feature was so far limited to users who signed
0 Comments
Caroline Ellison, former chief executive officer of Alameda Research LLC, center, arrives at court in New York, US, on Tuesday, Oct. 10, 2023.  Yuki Iwamura | Bloomberg | Getty Images In sentencing FTX founder Sam Bankman-Fried to a 25-year prison sentence on Thursday, Judge Lewis Kaplan cited testimony from Caroline Ellison, an ex-girlfriend of the
0 Comments
Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. “TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries
0 Comments
Sony has announced the slate of free games arriving on PlayStation Plus in April. The PS Plus monthly games for next month include first-person spell shooter Immortals of Aveum, spinoff strategy title Minecraft Legends and roguelike-action platformer Skul: The Hero Slayer. All three games will be accessible to PS Plus subscribers across Essential, Extra and
0 Comments
Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba’s Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana.
0 Comments
Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the “wall” command of the util-linux package that could be potentially exploited by a bad actor to leak a user’s password or alter the clipboard on certain Linux distributions. The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante.
0 Comments
Mar 28, 2024NewsroomCyber Espionage / Malware The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked as APT31 for orchestrating a cyber attack targeting the country’s Parliament in 2020. The intrusion, per the authorities, is said to have occurred between fall 2020 and early 2021. The agency described the ongoing criminal
0 Comments
Apple released the Vision Pro last month and the Cupertino-based tech giant seems to have shifted its focus to developing foldable smartphones after its first mixed-reality headset went on sale in the US. A new supply-chain report from Korea claims that the launch of Apple’s first, long-rumoured foldable iPhone has been pushed to 2027. This corroborates recent leaks that
0 Comments