New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices
Mar 30, 2023Ravie LakshmananNetwork Security A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11…
Mar 30, 2023Ravie LakshmananNetwork Security A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11…
Mar 30, 2023The Hacker NewsData Security / Encryption Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy…
Mar 30, 2023Ravie LakshmananCloud Security / Cyber Threat A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors…
Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded…
Malware analysis is an essential part of security researcher’s work. But working with malicious samples can be dangerous — it requires specialized tools to record…
Mar 29, 2023Ravie LakshmananZero-Day / Mobile Security A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target…
The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this…
Mar 29, 2023Ravie LakshmananLinux / Cyber Threat An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux…
Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with…
Mar 29, 2023Ravie LakshmananCyber Threat / Espionage A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather…
Mar 28, 2023Ravie LakshmananArtificial Intelligence / Cyber Threat Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in…
Mar 28, 2023The Hacker NewsPen Testing / Artificial Intelligence Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political, technological,…