Cybercriminals have begun to exploit a critical vulnerability in the WP Automatic plugin for WordPress, enabling them to create accounts with administrative privileges and install backdoors for long-term access. Installed on over 30,000 sites,...
In recent weeks, there has been an intensification of cyberattacks on Indian government bodies, initiated by groups linked to Pakistan. The analytical team at Seqrite Labs has identified several campaigns in which remote access...
ThreatFabric has identified a new malicious application named Brokewell, capable of recording every action on a device, from keystrokes to text input and application launches. The Trojan is distributed through a counterfeit Google Chrome...
Network security measures such as firewalls are designed to safeguard corporate networks from breaches. However, it turns out that cybercriminals are increasingly turning these systems against their owners, using them as springboards to infiltrate...
Security experts have identified a critical vulnerability in the Flowmon network performance monitoring tool from Progress Software, utilized by over 1,500 companies globally, including major organizations such as SEGA, KIA, and Volkswagen. The vulnerability...
Experts at Citizen Lab have identified vulnerabilities in popular keyboard applications that could be exploited to log keystrokes of Chinese users worldwide. These security issues are nearly ubiquitous across apps, including those pre-installed on...
Recently, Meta has decided to open its operating system to third-party manufacturers such as ASUS ROG and Lenovo. The new Meta Horizon OS will be licensed to these manufacturers, enabling their headsets to employ...
AMD’s forthcoming next-generation Zen 5 architecture Ryzen mobile processors, codenamed Strix Point, along with a robust APU—Strix Halo, are poised for release possibly within this year or potentially at next year’s CES. Currently, an...
Following ASUS’s initiative to launch a new version of BIOS for their Z790/690 motherboards to address instability issues with Intel’s 13th and 14th generation Core processors during gaming, MSI has also recently released a...
Cybersecurity researchers from Perception Point recently discovered a vulnerability on the Nespresso coffee machine and capsule manufacturer’s website, which scammers actively exploit to redirect users to malicious sites. The vulnerability, related to open redirection,...
Recently, security researchers identified a new vulnerability known as Dependency Confusion, affecting an archived Apache project titled Cordova App Harness. This vulnerability enables malefactors to manipulate package managers into downloading a fraudulent package from...
North Korean hackers exploited the eScan antivirus update mechanism to embed backdoors into corporate networks and disseminate cryptocurrency miners using the malicious software, GuptiMiner. Cybersecurity firm Avast reports that the perpetrators conducted an adversary-in-the-middle...
The South Korean police have issued a warning about cyberattacks by North Korean hacker groups targeting defense industry enterprises to steal valuable technological information. The police have documented several instances of successful breaches of...
The United States Treasury Department has announced the imposition of sanctions against four Iranian citizens and two corporations for their involvement in cyberattacks targeting U.S. government agencies, defense contractors, and private companies. The sanctions...
Framework, renowned for manufacturing modular laptops, offers products that enable users to replace various components such as the motherboard, I/O ports, and batteries themselves. When placing orders, customers can select the modules that best...
Recently, Taiwan Semiconductor Manufacturing Company (TSMC) held its 2024 North American Technology Forum, unveiling its latest advancements in process technology, advanced packaging, and 3D Integrated Circuits (3D IC). These sophisticated semiconductor technologies are poised...