Since the update to Windows 11 Build 26080, Microsoft has mandated that users employ processors supporting SSE 4.2 to run the Windows 11 24H2 operating system. This requirement marks the second system specification enhancement...
According to a recent report by Cisco Talos, the CoralRaider group is utilizing CDN platforms to disseminate malware in the United States, the United Kingdom, Germany, and Japan. The campaign aims to pilfer credentials,...
On April 17, researchers at Zscaler exposed a malicious software distribution campaign targeting IT professionals. This operation employs deceptive advertising of popular network utilities to implant a new backdoor named MadMxShell. The campaign was...
Cybersecurity experts from Fortinet have identified a new malicious package in the PyPI registry for developers, aimed at stealing user data from Discord. The package, named “discordpy_bypass-1.7,” was published on March 10, 2024, and...
As a result of an alleged cyberattack by a hacking group associated with the Anonymous collective, the Israeli Defense Forces (IDF) faced claims of compromising confidential data. According to the hackers, they accessed 20...
Over the past few years, security experts have observed an intensification of cyberattacks on organizations in Eastern and Western Europe, as well as North America. The perpetrators are hackers from the group known as...
Shmuel Cohen, a specialist at SafeBreach, demonstrated that EDR (Endpoint Detection and Response) solutions can be utilized as tools for conducting attacks. In his research, Cohen analyzed an EDR system, identifying vulnerabilities that could...
Specialists from Kaspersky Lab have discovered that the hacking group ToddyCat employs a diverse array of tools to maintain access to compromised systems and steal valuable data. Active since December 2020, the group primarily...
JPCERT specialists are raising alarms about a series of critical vulnerabilities in the Forminator plugin for WordPress, developed by WPMU DEV. This plugin, utilized by over 500,000 websites, enables the creation of various forms...
In the first quarter of 2024, the percentage of companies that agreed to pay ransoms to cybercriminals reached a record low of 28%. This statistic was provided by Coveware, a firm specializing in cybersecurity....
A recent study has unveiled vulnerabilities in the Windows operating system’s process of converting DOS to NT paths, potentially allowing malicious actors to conceal files, mimic directories and processes, and gain capabilities akin to...
Octapharma Plasma recently encountered a significant disruption within its IT infrastructure, resulting in the closure of over 150 blood plasma collection centers across the USA. The company’s website displayed a banner informing visitors that...
The operator of the HelloKitty ransomware program has announced a rebranding to HelloGookie and has released passwords for previously leaked source codes of CD Projekt RED, information about Cisco networks, as well as decryption...
HP has announced the launch of the OMEN 17 (2024 model), a gaming laptop that marks a significant shift in the company’s approach. For the first time since the series was introduced in 2016,...
Users of the CrushFTP file transfer software are strongly advised to upgrade to the latest version following the discovery of a vulnerability that has been subject to targeted exploitation. CrushFTP has issued a warning...
Palo Alto Networks has disclosed details of a critical vulnerability in the PAN-OS that has been actively exploited. The vulnerability designated CVE-2024-3400 with a CVSS score of 10.0, arises from a combination of two...