Recently, hackers have increasingly employed DNS tunneling to monitor when victims open phishing emails and click on malicious links, as well as to scan networks for vulnerabilities. DNS tunneling involves encoding data or commands...
Since April of this year, millions of phishing emails have been sent through the Phorpiex botnet as part of a large-scale campaign employing LockBit Black ransomware. This warning comes from the New Jersey Cybersecurity...
In June 2022, ASUS launched the ZenScreen OLED MQ16AH portable monitor. Recently, the product has seen an updated version, the MQ16AHE, which primarily features a more user-friendly stand design. The new model is already...
Patriot has announced a collaboration with MSI to launch the new Viper Xtreme 5 RGB DDR5 MPOWER series memory. This high-speed DDR5 memory kit is designed for gamers, overclocking enthusiasts, and high-end users, meeting...
In 2019, Intel first introduced the Ponte Vecchio based on the Xe-HPG architecture. During the Intel Unleashed event in early 2021, Intel CEO Pat Gelsinger publicly unveiled Ponte Vecchio, offering the world its first...
On May 14, 2024, Google held its annual Google I/O conference as scheduled. During the event, Google highlighted its latest and most advanced AI technologies and showcased their various applications. Interestingly, Google also introduced...
In February, OpenAI unveiled the Sora text-to-video generation model. By providing textual prompts describing video scenes, users can generate full-motion videos up to 60 seconds long. Recently, Google introduced its own AI video generation...
SiPearl, a chip design company established in January 2020 and based in France, specializes in designing Arm-based chips for supercomputers. SiPearl is committed to creating high-performance, low-power microprocessors for Europe’s exascale supercomputers, thereby ensuring...
On May 6, the Cybernews research team discovered an enormous dataset on the internet containing personal information exclusively of Chinese citizens. The volume of data has already exceeded 1.2 billion records and continues to...
Security researchers from Phylum have discovered a malicious package in the popular PyPI repository, masquerading as the well-known library “requests,” but posing a significant threat to the entire developer community. The package, named “requests-darwin-lite,”...
The malicious actor known as IntelBroker claims to have stolen confidential documents from Europol’s Europol Platform for Experts (EPE). Europol has confirmed the breach of the EPE portal, designed for knowledge and methodology exchange...
eSentire has reported a new wave of attacks by the FIN7 hacker group, which has disguised itself as well-known brands to distribute malware. The attacks targeted users who clicked on fake ads in Google,...
According to a joint report by the FBI and CISA, affiliates of the Black Basta group attacked over 500 organizations from April 2022 to May 2024. The group also encrypted and stole data from...
Previously, ASUS confirmed the release of an upgraded version of the ROG Ally handheld, known as the ROG Ally X, scheduled for official launch on June 2nd and is expected to make an appearance...
Google has issued an urgent security update for its Chrome browser to address a high-severity “out of bounds write” vulnerability in its V8 JavaScript engine, tracked as CVE-2024-4761. This vulnerability has been confirmed as...
The North Korean hacker group Kimsuky employs sophisticated cyber espionage techniques, including the use of social networks and system management tools, according to a recent report by the South Korean company Genians. Kimsuky actively...