Critical Zyxel Firewall Injection Flaw Exploited
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users. This vulnerability lets the unauthorized attacker execute the arbitrary…
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users. This vulnerability lets the unauthorized attacker execute the arbitrary…
A quick search for “ChatGPT” on the dark web and Telegram shows 27,912 mentions in the past six months. Much has been written about the…
A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It’s an open-source rootkit that has the ability to hide itself, other…
According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed at Norway’s public sector, and…
NuRR is a product that claims to intercept and capture the encryption keys at the start of a ransomware’s encryption process. With the keys caught,…
Apple has released security updates to address zero-day vulnerabilities exploited in attacks targeting iPhones, Macs, and iPads. “Apple is aware of a report that this…
The Russian ransomware group ‘Clop’ exploits a flaw in Progress Software’s MOVEit product suite in late May to steal data from unprotected networks. According to German…
According to local media, the cyberattack on the Norwegian ministries was made possible after unknown attackers exploited a new patch 0-day vulnerability. Norwegian authorities are…
In this podcast, we look at how to size storage for artificial intelligence (AI) and machine learning (ML) workloads that can range from batches of…
The Flipper Zero team has launched its very own ‘Flipper Apps’ mobile app store, allowing mobile users to install 3rd-party apps and extend the functionality…
Britain’s most secret court is investigating claims that UK agencies unlawfully monitored the phone communications of two Northern Ireland journalists. The Investigatory Powers Tribunal (IPT)…
Is your workout equipment hackable? In a recent report, Check Point security experts have revealed concerning vulnerabilities found in internet-connected workout equipment, particularly the widely…