Category: Information Security
Researchers at Recorded Future recently discovered that the creators of the SolarMarker malware have developed a multi-layered infrastructure to complicate efforts by law enforcement. “The core of SolarMarker’s operations is its layered infrastructure, which...
During a security audit of the QTS operating system, used in QNAP’s NAS products, fifteen vulnerabilities of varying severity were identified. Notably, eleven of these vulnerabilities remain unpatched. Among the discovered issues, CVE-2024-27130 stands...
In the era of big data, training Vision Transformer (ViT) models on extensive datasets has become the standard for enhancing performance in various AI tasks. Visual Prompts (VP), which introduce task-specific parameters, allow efficient...
According to a report by Insikt Group, cybercriminals are exploiting GitHub and FileZilla to deliver infostealers and trojans disguised as macOS applications such as 1Password, Bartender 5, and Pixelmator Pro. The campaign has been...
The United States Cybersecurity and Infrastructure Security Agency (CISA) included a vulnerability affecting Mirth Connect from NextGen Healthcare in its Known Exploited Vulnerabilities (KEV) catalog last Monday, May 20. The vulnerability, designated CVE-2023-43208, involves...
The cybersecurity world is alarmed by new devastating attacks targeting Israel and Albania. These attacks are orchestrated by an Iranian group affiliated with the Ministry of Intelligence and Security (MOIS). Check Point Research specialists...
OmniVision, a renowned manufacturer of image sensors utilized in numerous smartphone cameras worldwide, has announced a data security breach following a ransomware attack. The company’s headquarters are located in California, and in 2023, it...
Since the beginning of March this year, cybersecurity researchers have observed a sharp increase in phishing campaigns aimed at distributing a new malware loader, Latrodectus, considered the successor to IcedID. Experts from Elastic Security...
Tenable experts have identified a critical vulnerability in Fluent Bit, which could lead to DoS attacks and remote code execution. This flaw affects all major cloud providers, including Amazon AWS, Google GCP, and Microsoft...
Cybercriminals have devised a sophisticated scheme to infect corporate networks with malware. They place advertisements in search engines like Google that link to downloads of popular Windows utilities. However, instead of legitimate programs, victims...
The hacker group behind the Grandoreiro banking Trojan for Windows has resumed its global campaign as of March 2024, following a law enforcement operation that dismantled its infrastructure in January. According to IBM X-Force,...
Students Alexander Sherbrooke and Iakov Taranenko from the University of California, Santa Cruz, discovered a critical vulnerability in the payment system of CSC ServiceWorks laundries, allowing anyone to use the machines for free. Despite...
A group of scientists from Singapore has developed a method to interfere with the operation of autonomous vehicles that use computer vision for road sign recognition. The new technique, called GhostStripe, poses a potential...
A recent video by the popular YouTuber Eric Parker sparked a storm of emotions among internet users. Parker vividly demonstrated the dangers of connecting old operating systems to the internet without any protection, including...
Researchers from Cyble have discovered a new banking Trojan targeting Android devices. This sophisticated malware possesses a multitude of dangerous features, including overlay attacks, keylogging, and obfuscation techniques. The Trojan, named “Antidot” based on...
The hacker group Pink Drainer has announced the conclusion of their activities, claiming to have achieved their goal of stealing $85 million in cryptocurrency. The group promised to dismantle the infrastructure used in their...