The pentester's Swiss knife
Microsoft‘s own PowerToys is an exceptionally useful suite of utility software. I often use PowerToys Run for file searches and simple calculations. According to a report from Windows Central, the recent v0.81.0 update to...
Experts at Elastic Security Labs and Antiy have uncovered a new cryptocurrency mining campaign codenamed REF4578, wherein the GhostEngine malware exploits vulnerable drivers to disable antivirus programs and deploy the XMRig miner. Elastic Security...
Researchers at Recorded Future recently discovered that the creators of the SolarMarker malware have developed a multi-layered infrastructure to complicate efforts by law enforcement. “The core of SolarMarker’s operations is its layered infrastructure, which...
During a security audit of the QTS operating system, used in QNAP’s NAS products, fifteen vulnerabilities of varying severity were identified. Notably, eleven of these vulnerabilities remain unpatched. Among the discovered issues, CVE-2024-27130 stands...
In the era of big data, training Vision Transformer (ViT) models on extensive datasets has become the standard for enhancing performance in various AI tasks. Visual Prompts (VP), which introduce task-specific parameters, allow efficient...
Microsoft has officially confirmed plans to phase out NT LAN Manager (NTLM) in Windows 11 in the latter half of 2024, announcing a series of new security measures to enhance the operating system’s protection....
According to a report by Insikt Group, cybercriminals are exploiting GitHub and FileZilla to deliver infostealers and trojans disguised as macOS applications such as 1Password, Bartender 5, and Pixelmator Pro. The campaign has been...
The United States Cybersecurity and Infrastructure Security Agency (CISA) included a vulnerability affecting Mirth Connect from NextGen Healthcare in its Known Exploited Vulnerabilities (KEV) catalog last Monday, May 20. The vulnerability, designated CVE-2023-43208, involves...
The cybersecurity world is alarmed by new devastating attacks targeting Israel and Albania. These attacks are orchestrated by an Iranian group affiliated with the Ministry of Intelligence and Security (MOIS). Check Point Research specialists...
OmniVision, a renowned manufacturer of image sensors utilized in numerous smartphone cameras worldwide, has announced a data security breach following a ransomware attack. The company’s headquarters are located in California, and in 2023, it...
Since the beginning of March this year, cybersecurity researchers have observed a sharp increase in phishing campaigns aimed at distributing a new malware loader, Latrodectus, considered the successor to IcedID. Experts from Elastic Security...
Tenable experts have identified a critical vulnerability in Fluent Bit, which could lead to DoS attacks and remote code execution. This flaw affects all major cloud providers, including Amazon AWS, Google GCP, and Microsoft...
As AMD’s share of the x86 processor market continues to grow, they are venturing into new territories. In the entry-level server market, which was previously dominated by Intel’s Xeon E series, AMD has introduced...
Recently, there have been numerous updates about Arrow Lake, Intel’s next-generation processor for desktop platforms, codenamed Arrow Lake-S, also known as the Core Ultra 2 series. This new series will utilize the LGA 1851...
According to a report from NotebookCheck, Sony’s next-generation Xperia Pro is expected to be released in the fourth quarter of this year, possibly featuring a one-inch main camera. The article on NotebookCheck cites a...
Cybercriminals have devised a sophisticated scheme to infect corporate networks with malware. They place advertisements in search engines like Google that link to downloads of popular Windows utilities. However, instead of legitimate programs, victims...