Undocumented hidden feature found in Espressif ESP32 microchip
Undocumented hidden feature found in Espressif ESP32 microchip Pierluigi Paganini March 09, 2025 Experts discovered an undocumented hidden feature in the ESP32 microchip manufactured by…
Undocumented hidden feature found in Espressif ESP32 microchip Pierluigi Paganini March 09, 2025 Experts discovered an undocumented hidden feature in the ESP32 microchip manufactured by…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourselfWhile…
Akira ransomware gang used an unsecured webcam to bypass EDR Pierluigi Paganini March 08, 2025 The Akira ransomware gang exploited an unsecured webcam to bypass…
Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies Pierluigi Paganini March 08, 2025 A data breach suffered by the Japanese telecom…
A software developer has been found guilty of sabotaging his ex-employer’s systems by running custom malware and installing a “kill switch” after being demoted at the…
The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented backdoor that could…
Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos. The threat actors take advantage…
Push notifications are a common feature that many websites use to keep users engaged. However, what happens when these notifications turn malicious? Renée Burton, Vice…
Business executives never think they’ll be victims of a cyberattack until it happens to them—and by that point, it’s already too late. Over the course…
As Donald Trump’s administration continues its relentless reorganization of the United States federal government, documents obtained by WIRED showed this week that the Department of…
AI applications are embedded in our phones and becoming a vital part of life. To accelerate mainstream adoption, technology companies are inundating us with TV…
As organizations accelerate their cloud adoption for cost-efficiency, scalability, and faster service delivery, cybercriminals are taking notice. Cloud technology has become a cornerstone of modern…