Novel phishing campaign uses corrupted Word documents to evade security
A novel phishing attack abuses Microsoft’s Word file recovery feature by sending corrupted Word documents as email attachments, allowing them...
Read more →A novel phishing attack abuses Microsoft’s Word file recovery feature by sending corrupted Word documents as email attachments, allowing them...
Read more →SUMMARY Targeted Campaign: SmokeLoader malware attacks Taiwanese industries, including manufacturing, healthcare, and IT. Phishing Emails: The campaign uses phishing emails...
Read more →The recently uncovered ‘Bootkitty’ Linux UEFI bootkit exploits the LogoFAIL flaw, tracked as CVE-2023-40238, to target computers running on vulnerable...
Read more →Intel has confirmed the departure of its CEO Pat Gelsinger, several months after the company’s failure to profit from the...
Read more →Australia has proposed a law that could impose fines of up to $50 million on global technology companies if they...
Read more →UnitingCare Queensland is improving access to data and quality-of-care outcomes across four of its hospitals following the replacement of a...
Read more →In his opening address at the start of the UK and Ireland SAP User Group (UKISUG) Connect conference in Birmingham,...
Read more →Intel chief executive Pat Gelsinger has stepped down less than four years after taking the helm of the company, handing...
Read more →CleverSoar, a new malware installer, targets Chinese and Vietnamese users to deploy advanced tools like Winos4.0 and Nidhogg rootkit. These...
Read more →While Europe recalibrates its semiconductor ambitions, the Netherlands is taking a decisive step forward with Project Beethoven, a €2.5bn initiative...
Read more →Chinese-made lidar sensors could expose the US military to hacking and sabotage during a conflict, according to a Washington think...
Read more →Wevtutil.exe, a Windows event log utility, can be used maliciously in Living Off the Land (LOLBAS) to export logs for...
Read more →