Author: Cybernoz

A fifth of new PCs shipped in Q3 were AI-optimised
14
Nov
2024

A fifth of new PCs shipped in Q3 were AI-optimised

A fifth of all PCs shipped in the third quarter of 2024 were equipped to support artificial intelligence (AI), Canalys…

New NAND Chip Attack Lets Attackers Uncover Secrets & Reverse Engineer
14
Nov
2024

New NAND Chip Attack Lets Attackers Uncover Secrets & Reverse Engineer

A new hardware hacking technique targeting NAND flash memory chips has emerged, allowing attackers to extract sensitive data and reverse…

NIST is chipping away at NVD backlog
14
Nov
2024

NIST is chipping away at NVD backlog

The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability…

Virtual wards to digital feedback: the Nordic approach to post-pandemic healthcare
14
Nov
2024

Virtual wards to digital feedback: the Nordic approach to post-pandemic healthcare

Covid-19 changed the global landscape of healthcare, with institutions around the world realising the need for more advanced digital intervention…

Hackers Leveraging Extended Attributes To Evade detection In macOS Systems
14
Nov
2024

Hackers Leveraging Extended Attributes To Evade detection In macOS Systems

Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in…

How to Combat the $10.5 Trillion Cybercrime Surge
14
Nov
2024

How to Combat the $10.5 Trillion Cybercrime Surge

14 Nov Cybersecurity in Crisis: How to Combat the $10.5 Trillion Cybercrime Surge This week in cybersecurity from the editors…

MPs hold first ever debate on live facial recognition
14
Nov
2024

MPs hold first ever debate on live facial recognition

MPs have debated police use of live facial recognition (LFR) for the first time, with a consensus emerging on the…

New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers
14
Nov
2024

New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers

Stealers are designed to be stealthy primarily to avoid detection by AV tools and to remain hidden from the user….

Lazarus Group Targets macOS with RustyAttr Trojan in Fake Job PDFs
14
Nov
2024

Lazarus Group Targets macOS with RustyAttr Trojan in Fake Job PDFs

Group-IB has uncovered Lazarus group’s stealthy new trojan and technique of hiding malicious code in extended attributes on macOS. Learn…

man and woman sharing a Mac
14
Nov
2024

Advertisers are pushing ad and pop-up blockers using old tricks

Despite the countermeasures some services are taking against well-known ad blockers, lots of people now use one. This is no…

Legion Stealer V1 Attacking Users To Gain Users Webcam Access
14
Nov
2024

Legion Stealer V1 Attacking Users To Gain Users Webcam Access

A new and sophisticated malware threat has emerged in the cybersecurity landscape, targeting unsuspecting users and potentially compromising their privacy…

Google launches on-device AI to alert Android users of scam calls in real-time
14
Nov
2024

Google launches on-device AI to alert Android users of scam calls in real-time

Google has announced new security features for Android that provide real-time protection against scams and harmful apps. These features, powered…