The pentester's Swiss knife
Spyware was discovered on guest registration computers at several Wyndham hotel locations in the United States, capturing and publishing screenshots containing personal customer information. The program, named “pcTattletale,” continuously took screenshots of the hotel’s...
Chinese hackers have increasingly leveraged an extensive network of proxies composed of VPS servers and compromised online devices to conduct espionage. These proxy networks consist of Operational Relay Boxes (ORBs), administered by independent cybercriminals...
Rockwell Automation strongly urges its clients to disconnect all ICS control systems not intended for internet connectivity to prevent unauthorized or malicious cyberattacks. This measure is crucial due to escalating geopolitical tensions and increased...
According to AMD’s RDNA/CDNA architecture roadmap, the RDNA 4 architecture GPUs correspond to the Navi 4x series chips, which will utilize a 4nm manufacturing process to further enhance energy efficiency. Rumors suggest there will...
Philips has announced the launch of its new Evnia 5000 series gaming monitor: the 27M2N5500. The Evnia brand is geared towards young gamers, and Philips has previously released a range of products under this...
This year, NVIDIA is set to release its next generation of gaming graphics cards, the GeForce RTX 50 series based on the Blackwell architecture, anticipated to arrive as early as the fourth quarter. Like...
AI technology is undoubtedly a hot topic in the tech industry, and recently, an increasing number of game developers have integrated AI technology into their games. For instance, the popular shooter game “The Finals”...
At the beginning of this year, an internet user revealed that during CES 2024, they visited the SK Hynix booth, where a staff member indicated that CAMM memory modules would also be used in...
In a swift response to a critical security threat, Google has released an emergency update for its Chrome browser, aimed at addressing a zero-day vulnerability actively exploited in the wild. The high-severity flaw, identified...
In March, the WhatsApp security team reported a significant threat to users of the messaging platform. Despite robust encryption, users remain vulnerable to government surveillance. An internal document obtained by The Intercept asserts that...
One of the leading blockchain gaming platforms, Gala Games, has fallen victim to a large-scale hack, unparalleled in the industry. According to Gala Games’ founder, Eric Schiermeyer, hackers liquidated 600 million internal GALA tokens,...
According to research by SentinelOne, ideologically motivated hacker groups are increasingly attempting to destabilize the Philippines through cyberattacks. Notably, the hacktivist collective Ikaruz Red Team is leveraging leaked builders of popular ransomware programs to...
Veeam is urging all users of Veeam Backup Enterprise Manager to update their software to the latest version due to the discovery of a critical vulnerability that allows attackers to bypass authentication safeguards. Veeam...
GitHub has released patches to address a critical vulnerability in GitHub Enterprise Server (GHES) that could allow attackers to bypass authentication systems. The vulnerability, identified as CVE-2024-4985 with a maximum CVSS rating of 10.0,...
The LockBit group has claimed responsibility for the cyberattack on the Canadian pharmacy chain London Drugs and is now threatening to release the stolen data following unsuccessful negotiations. The cyberattack on April 28 forced...
The mainstream memory in the industry is currently transitioning to DDR5, and over the past two years, speeds have soared at an astonishing rate. Initially, at 4.8 Gbps, speeds above 6 Gbps are now...