Chip Flaw ‘GhostWrite’ Steals Data from CPU Memory
Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal sensitive data from memory. Learn how this…
Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal sensitive data from memory. Learn how this…
Black Hat USA 2024 is up and running at full pace as critical AWS vulnerabilities are exposed! Learn how attackers could exploit “shadow resources” to…
Thousands of Industrial Control Systems in the US and UK are vulnerable to cyberattacks, putting critical infrastructure like water systems at risk. A new report…
Learn how a smart contract vulnerability led to the theft of $1.8 million from Nexera, a DeFi protocol. Discover the hacker’s tactics and the ongoing…
Cybersecurity firm Bitdefender reveals critical vulnerabilities in solar power management platforms, putting 20% of global solar production at risk. Attackers could cause blackouts and disrupt…
A vulnerability in Microsoft 365’s anti-phishing measures allows malicious actors to deceive users into opening harmful emails by hiding the First Contact Safety Tip using…
National Public Data, a service by Jerico Pictures Inc., suffered a massive breach. Hacker “Fenice” leaked 2.9 billion records with personal details, including full names,…
A major cyberattack on Mobile Guardian, a leading MDM provider, resulted in the remote wiping of 13,000 devices in Singapore. Learn about the implications for…
The non-profit blood donation service suffered a ransomware attack last week and has requested urgent and emergency blood donations. The aftermath of the crippling ransomware…
StormBamboo abuses insecure software updates! Don’t be a victim! This article explores how the StormBamboo group compromises ISPs to tamper with software update mechanisms and…
A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later dumped online by another threat actor, Dominatrix.…
Apple’s open-source “swift-homomorphic-encryption” package revolutionizes privacy in cloud computing. It allows computations on encrypted data without decryption, safeguarding user information. Used in iOS 18 Live…