China-linked Salt Typhoon APT compromised more US telecoms than previously known
06
Jan
2025

China-linked Salt Typhoon APT compromised more US telecoms than previously known

China-linked Salt Typhoon APT compromised more US telecoms than previously known Pierluigi Paganini January 06, 2025 China-linked Salt Typhoon group…

Weaponized Python Scripts Deliver New SwaetRAT Malware
06
Jan
2025

Weaponized Python Scripts Deliver New SwaetRAT Malware

The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries like `System.Reflection`, `ctypes`, and `wintypes`,…

Terraform Labs Founder Do Kwon Extradited to US, Faces 130-Year Sentence
06
Jan
2025

Terraform Labs Founder Do Kwon Extradited to US, Faces 130-Year Sentence

SUMMARY: Extradition: Terraform Labs founder Do Kwon has been extradited from Montenegro to the United States. Fraud Charges: Kwon faces…

iPhone Sharing the Photos by Default to Apple
06
Jan
2025

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new feature in Apple’s Photos app within…

“Bad Likert Judge” – New Technique to Jainbreak AI Using LLM Vulnerabilities
06
Jan
2025

“Bad Likert Judge” – New Technique to Jainbreak AI Using LLM Vulnerabilities

In a revealing study, researchers have introduced a new text-generation AI jailbreak technique, dubbed the “Bad Likert Judge.” This method,…

Stealthy Steganography Backdoor Attacks Target Android Apps
06
Jan
2025

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile devices. Existing backdoor attacks often…

Jane Devry
06
Jan
2025

BLUECAT EDGE FOR COMPREHENSIVE PROTECTIVE DNS

The increasing complexity of hybrid and multi-cloud environments, along with the rising frequency of sophisticated DNS-based attacks, has created significant…

week in security
06
Jan
2025

Some weeks in security (December 16 – January 5)

January 3, 2025 – Invitations to try a beta lead to a fake game website where victims will get an…

The Defender vs. The Attacker Game
06
Jan
2025

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and attacker in trigger-based black-box model…

ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency
06
Jan
2025

New SQLi Detection Method To Improve Pentesting Efficiency

A team of researchers has developed a novel approach called ART4SQLi that aims to enhance the efficiency of SQL injection…

Windows 11 BitLocker Bypassed to Extract Encryption Keys
06
Jan
2025

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as analysis of this memory may reveal…

Jane Devry
06
Jan
2025

From Shadows to Spotlight: Addressing the Hidden Dangers of Dormant Service Accounts

A silent threat lurks beneath the surface in today’s enterprise systems: dormant service accounts. These automated, non-human identities, inactive for…