Researchers from Trustwave have reported a steady increase in the use of a Phishing-as-a-Service (PhaaS) platform called Greatness, which targets the collection of Microsoft 365 user credentials. Greatness is marketed to other cybercriminals as...
Security experts from Malwarebytes have recently uncovered a malicious campaign targeting Chinese-speaking users, who fell victim to cybercriminals through the Google Ads advertising service. Cybercriminals exploited Google advertiser accounts to create fraudulent ads that...
AOC has announced the launch of its new G4X series gaming monitors, featuring a fresh and stylish design, set to replace the previous G2 series. The initial G4X lineup includes two models: the 24G4X...
Numerous publicly available Proof-of-Concept (PoC) exploits for a critical vulnerability in Jenkins, which allow an unauthenticated attacker to read arbitrary files, have emerged, and cyber criminals are already actively leveraging these flaws in their...
Minisforum has announced the launch of the HX100G Mini PC, a successor to last year’s HX99G Mini PC. This new iteration features an AMD Ryzen 7 7840HS processor, coupled with an AMD Radeon RX...
A critical zero-click vulnerability, CVE-2023-7028 (rated CVSS 10.0) has been discovered by researchers in over 5,300 instances of GitLab accessible from the internet. Although the issue has been rectified in the latest versions of...
Researchers at Arctic Wolf have discovered a new malicious downloader, crafted in the Go language and dubbed CherryLoader. This threat, previously observed in the wild, aims to facilitate the delivery of additional malware onto...
The cybersecurity firm Orca Security has identified a vulnerability in Google Kubernetes Engine (GKE) that enables individuals with a Google account to gain control over Kubernetes clusters. This issue has been codenamed Sys:All. It...
In today’s world, where technology has reached an advanced level of development, the issue of global surveillance becomes particularly pressing. According to an investigation by 404 Media, hundreds of thousands of popular applications are...
The Slovak cybersecurity firm ESET has uncovered the operations of a previously unknown hacker group linked to China, christening it with the codename Blackwood. Active since 2018, this group has specialized in adversary-in-the-middle (AitM),...
A recent study by Dutch researcher Tom Meurs from the University of Twente has uncovered factors influencing the likelihood of ransomware victims paying ransoms to cybercriminals. The analysis utilized data from the Dutch police...
Google previously faced a copyright infringement lawsuit from the private startup Singular Computing over the design of its computational accelerator, TPU. The two parties have settled, although the specifics of the agreement have not...
Next year, AMD will introduce Kraken Point to succeed the current Hawk Point, namely the Ryzen 8040 series. Concurrently, AMD is preparing an extensive APU lineup including Fire Range, Strix Point, and Strix Point...
According to wccftech, Microsoft recently announced the layoff of 1,900 employees from the Xbox and Activision Blizzard teams, approximately 10% of the total workforce in its gaming division. The Activision Blizzard team was particularly...
Key Features and Functionalities to Consider When Evaluating VDR Service Providers Modern businesses must win serious competition for the attention of potential customers. Advanced technologies provide additional benefits and increased workflow efficiency. Today, many...
At the outset of this week, Microsoft disclosed that its corporate email system had been compromised by the Russian-speaking hacker collective known as Midnight Blizzard (also recognized as Nobelium, APT29, and Cozy Bear), wherein...