Beware of Ramadan & Eid Fitr Online Scams Steal Financial Data
25
Mar
2024

Beware of Ramadan & Eid Fitr Online Scams Steal Financial Data

As the holy month of Ramadan approaches, bringing a surge in online shopping and charitable giving, cybercriminals are ramping up…

Step-by-Step Guide to Creating Your First Crypto Wallet
25
Mar
2024

Step-by-Step Guide to Creating Your First Crypto Wallet

Entering the dynamic world of cryptocurrencies is pretty exciting. But one can easily get overwhelmed with the amount of information…

The Finnish Food Authority uses AI to accelerate research
25
Mar
2024

Biodiversity’s importance to sustainable datacentre computing

IT providers might have enough on their plates with environmental, social and governance (ESG) requirements, but experts say adding biodiversity…

StrelaStealer targeted 100+ organizations across the EU and US
25
Mar
2024

StrelaStealer targeted 100+ organizations across the EU and US

StrelaStealer targeted over 100 organizations across the EU and US Pierluigi Paganini March 25, 2024 Researchers reported that over 100…

week in security
25
Mar
2024

A week in security (March 18 – March 24)

March 22, 2024 – Since the main reason for the ban was to prevent car thefts that didn’t happen, we’re…

Apple Vulnerability
25
Mar
2024

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations….

Phishing Attacks
25
Mar
2024

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

Mar 25, 2024NewsroomCyber Espionage / Email Security The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has…

GoFetch side-channel attack against Apple systems allows secret keys extraction
25
Mar
2024

GoFetch side-channel attack against Apple systems allows secret keys extraction

GoFetch side-channel attack against Apple systems allows secret keys extraction Pierluigi Paganini March 25, 2024 Researchers demonstrated a new side-channel…

XSS Vulnerability in Google Subdomain Let Hackers Hijacks the User Sessions
25
Mar
2024

XSS Vulnerability in Google Subdomain Let Hackers Hijacks the User Sessions

Security researcher Henry N. Caga has identified a significant cross-site scripting (XSS) vulnerability within a Google sub-domain that allows hackers…

R00Tk1t Targets India's Elections: Warns Of BJP Cyberattack
25
Mar
2024

R00Tk1t Targets India’s Elections: Warns Of BJP Cyberattack

The notorious hacking group R00Tk1t has shifted its focus from Malaysian organizations toward India, marking a concerning development in the…

MobSF Pen-Testing Tool Input Validation Flaw Leads to SSRF
25
Mar
2024

MobSF Pen-Testing Tool Input Validation Flaw Leads to SSRF

The Mobile Security Framework (MobSF), a widely used pen-testing, malware analysis, and security assessment framework, has been found to contain…

Hackers Claiming Unauthorized Access to the Fortinet Devices
25
Mar
2024

Hackers Claiming Unauthorized Access to the Fortinet Devices

Hackers have claimed unauthorized access to Fortinet devices across various companies. This breach highlights cybercriminals’ persistent threat to corporate security…