Category: Information Security
The U.S. Environmental Protection Agency (EPA) is intensifying its oversight of critical water infrastructure due to the escalating threat of cyberattacks. Recently, the agency issued a warning urging municipal services to take immediate measures...
Experts at Kaspersky Lab have identified attacks on corporate devices using a new ransomware program called ShrinkLocker, which exploits BitLocker. BitLocker is a security feature in Windows that protects data through encryption. The targets...
Spyware was discovered on guest registration computers at several Wyndham hotel locations in the United States, capturing and publishing screenshots containing personal customer information. The program, named “pcTattletale,” continuously took screenshots of the hotel’s...
Chinese hackers have increasingly leveraged an extensive network of proxies composed of VPS servers and compromised online devices to conduct espionage. These proxy networks consist of Operational Relay Boxes (ORBs), administered by independent cybercriminals...
Rockwell Automation strongly urges its clients to disconnect all ICS control systems not intended for internet connectivity to prevent unauthorized or malicious cyberattacks. This measure is crucial due to escalating geopolitical tensions and increased...
In a swift response to a critical security threat, Google has released an emergency update for its Chrome browser, aimed at addressing a zero-day vulnerability actively exploited in the wild. The high-severity flaw, identified...
In March, the WhatsApp security team reported a significant threat to users of the messaging platform. Despite robust encryption, users remain vulnerable to government surveillance. An internal document obtained by The Intercept asserts that...
One of the leading blockchain gaming platforms, Gala Games, has fallen victim to a large-scale hack, unparalleled in the industry. According to Gala Games’ founder, Eric Schiermeyer, hackers liquidated 600 million internal GALA tokens,...
According to research by SentinelOne, ideologically motivated hacker groups are increasingly attempting to destabilize the Philippines through cyberattacks. Notably, the hacktivist collective Ikaruz Red Team is leveraging leaked builders of popular ransomware programs to...
Veeam is urging all users of Veeam Backup Enterprise Manager to update their software to the latest version due to the discovery of a critical vulnerability that allows attackers to bypass authentication safeguards. Veeam...
GitHub has released patches to address a critical vulnerability in GitHub Enterprise Server (GHES) that could allow attackers to bypass authentication systems. The vulnerability, identified as CVE-2024-4985 with a maximum CVSS rating of 10.0,...
The LockBit group has claimed responsibility for the cyberattack on the Canadian pharmacy chain London Drugs and is now threatening to release the stolen data following unsuccessful negotiations. The cyberattack on April 28 forced...
Experts at Elastic Security Labs and Antiy have uncovered a new cryptocurrency mining campaign codenamed REF4578, wherein the GhostEngine malware exploits vulnerable drivers to disable antivirus programs and deploy the XMRig miner. Elastic Security...
Researchers at Recorded Future recently discovered that the creators of the SolarMarker malware have developed a multi-layered infrastructure to complicate efforts by law enforcement. “The core of SolarMarker’s operations is its layered infrastructure, which...
During a security audit of the QTS operating system, used in QNAP’s NAS products, fifteen vulnerabilities of varying severity were identified. Notably, eleven of these vulnerabilities remain unpatched. Among the discovered issues, CVE-2024-27130 stands...
In the era of big data, training Vision Transformer (ViT) models on extensive datasets has become the standard for enhancing performance in various AI tasks. Visual Prompts (VP), which introduce task-specific parameters, allow efficient...