At the re:Invent 2023 conference, AWS announced the launch of a suite of artificial intelligence application services, enhanced through the implementation of foundational models to elevate the user experience. AWS is leveraging these foundational...
According to the revelations by X blogger Mochamad Farido Fanani, Huawei plans to launch a VR headset as a competitor to the Apple Vision Pro, thereby venturing into the wearable head-mounted display market. Following...
Popular PDF reader Foxit Reader has been found to harbor multiple security vulnerabilities that could allow attackers to remotely execute malicious code on vulnerable systems. These vulnerabilities, discovered by researchers from Cisco’s Talos Vulnerability...
In a worrying turn of events, a critical security vulnerability has been discovered in WPS Office, a popular productivity suite used by millions of individuals and organizations worldwide. This vulnerability tracked as CVE-2023-31275 and...
One of the most popular tools for hacking cryptocurrency wallets, Inferno Drainer, announced its definitive closure. On November 26, the service team, in a statement published on Telegram, declared that “time for us to...
On November 22, hackers launched a sophisticated cyberattack against CTS, the largest provider of managed IT services in the United Kingdom. The incident resulted in significant disruptions for numerous legal firms and severely undermined...
Perl, a versatile and widely used programming language, has been a mainstay in the developer’s toolkit for decades. However, like any software, Perl is not immune to vulnerabilities. Recently, two critical security flaws were...
In today’s hyperconnected world, portable hotspots have become indispensable tools for staying connected on the go. However, these devices are not immune to security vulnerabilities, and one such vulnerability has been discovered in the...
At the beginning of this month, MediaTek announced the launch of the Dimensity 9300, a processor that stands out with its innovative all-big-core architecture, delivering unprecedentedly high intelligence, performance, energy efficiency, and low power...
Security researcher Matei “Mal” Badanoiu disclosed the proof-of-concept (PoC) of a patched vulnerability that was tracked as CVE-2023-34468 and has been found to impact Apache NiFi. Assigned a CVSS score of 8.8, the flaw...
Introduction In the rapidly evolving landscape of container orchestration, Kubernetes has emerged as the de facto standard, powering the deployment and management of containerized applications across diverse environments. While Kubernetes offers unparalleled flexibility and...
Apache DolphinScheduler is a popular open-source workflow management platform that is widely used by enterprises to orchestrate and manage complex data processing pipelines. Recently, a critical vulnerability, CVE-2023-48796, was discovered in Apache DolphinScheduler that...
Trend Micro has uncovered a malicious Chrome extension named ParaSiteSnatcher, primarily targeting users in Latin America, specifically in Brazil. This extension empowers malefactors to track, manipulate, and purloin sensitive information from various sources, encompassing financial...
Google recently announced an upgrade to their chatbot, Bard, enabling it to swiftly comprehend YouTube video content. Google believes Bard is now capable of extracting valuable information from this vast video repository, providing rapid...
Recently, Cisco’s Talos intelligence group unveiled critical vulnerabilities in Adobe Acrobat Reader, a widely used PDF tool. These vulnerabilities, if exploited, could lead to arbitrary code execution, compromising the security and privacy of millions...
In the ever-evolving landscape of cyber threats, a new menace has emerged, capturing the attention of IBM X-Force researchers: the WailingCrab malware. Also known as WikiLoader, this multi-component malware has been evolving, especially in...