Previously, we discussed Meta’s initiative to enhance the 2D application UX/UI for its Quest headsets. However, what went unmentioned in that report is the paucity of such applications within the Meta Quest App Store,...
In the waning days before last Christmas, LG unveiled a tantalizing preview of its 2024 UltraGear OLED gaming monitor lineup. This new array of products spans sizes from 32 inches to 45 inches, incorporating...
Researchers have unveiled a novel menace targeting telecommunications networks: the cunning Linux-based backdoor, GTPDOOR, exploiting GPRS protocol vulnerabilities to clandestinely monitor infected devices. This malevolent software, linked to the notorious hacking collective LightBasin previously...
Semperis has unveiled a novel attack technique named Silver SAML, capable of circumventing protection in identification systems. Silver SAML enables the utilization of SAML to initiate attacks from the identity provider’s side (such as...
Researchers at Apiiro investigated a widespread campaign of attacks on the GitHub platform using malicious repositories. The experts identified over 100,000 counterfeit repositories, mimicking popular open-source projects to disseminate malware. The number of such...
Two Chinese hacking factions, known as UNC5325 and UNC3886, breached the security systems of software developed by Ivanti, which is deployed for safeguarding Virtual Private Networks (VPN). Mandiant experts discovered that UNC5325 exploited a...
An obscure hacking collective, christened SPIKEDWINE, has launched attacks against diplomats across several European nations where Indian diplomatic missions are operational. To achieve their nefarious objectives, the culprits have deployed a novel malicious backdoor...
A new Linux version of the Bifrost remote access trojan has emerged, employing a suite of novel camouflage techniques. Among its primary tools is a deceptive domain, mimicking the legitimate VMware. First identified two...
Before the commencement of GDC 2024, Microsoft announced its collaboration with NVIDIA, AMD, and Intel. Through an API resource known as DirectSR, the initiative aims to enhance the resolution and performance of games on...
Information has surfaced online that internet-connected 3D printers by Anycubic have been hacked to alert users to a critical vulnerability within the devices. The hacker added a file named “hacked_machine_readme.gcode,” which typically contains instructions...
North Korean hackers from the Lazarus group exploited a vulnerability in the Windows AppLocker driver to gain kernel-level access and disable security measures, avoiding detection. Avast analysts identified and reported the hackers’ activities to...
Last week, a cyberattack on a UnitedHealth Group division disrupted medication distribution and insurance processes in pharmacies across the United States, causing significant challenges for healthcare workers. Experts warn that the incident could lead...
In Australia, the threat of espionage and foreign interference has escalated to unprecedented levels, warns Mike Burgess, the Director-General of the Australian Security Intelligence Organisation (ASIO). He expressed his concern that an increasing number...
According to the latest insights from analysts at Mandiant, the Middle East has become the focal point of an ongoing cyber espionage operation utilizing distinctive malware targeting the aerospace, aviation, and defense industries. The...
The North Korea-supported hacker group Lazarus has uploaded four malicious packages to the Python Package Index (PyPI) repository, aiming to infect developers’ systems with malevolent software. The implicated packages—“pycryptoenv,” “pycryptoconf,” “quasarlib,” and “swapmempool”—have been...
Since the outset of November 2023, Cisco Talos has reported that Mexican users have been targeted by a sophisticated phishing campaign distributing a novel Windows malware dubbed TimbreStealer. This phishing initiative employs tax-themed decoy...