SystemBC RAT now targets Linux, enabling ransomware gangs like Ryuk & Conti to spread, evade detection, and maintain encrypted C2 traffic for stealthy cyberattacks. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read…
Category: EN
OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia
OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in its efforts to reduce its dependency on Nvidia by developing its first in-house artificial intelligence chip. According to the source, OpenAI is finalizing the design…
Breaking (Fire)Walls & Glass Ceilings: Women Leading Digital Revolution and Cyber Security’s Next Frontier
Cyber security is at the heart of today’s digital revolution, yet it remains one of the most male-dominated sectors in science and technology. Data from Zippia shows that while women hold 48% of roles in the broader workforce, they represent…
Crooks use Google Tag Manager skimmer to steal credit card data from a Magento-based e-stores
Sucuri researchers observed threat actors leveraging Google Tag Manager (GTM) to install e-skimmer software on Magento-based e-stores. Sucuri researchers found threat actors using Google Tag Manager (GTM) to deploy e-skimmer malware on a Magento eCommerce site. Google Tag Manager (GTM)…
Deepfakes: How Deep Can They Go?
With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer… The post Deepfakes: How Deep Can They Go? appeared first…
Intel Patched 374 Vulnerabilities in 2024
Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects. The post Intel Patched 374 Vulnerabilities in 2024 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
8Base Ransomware Site Seized, Phobos Suspects Arrested in Thailand
Four Europeans were arrested in Phuket, believed to be members of the Phobos ransomware group This article has been indexed from www.infosecurity-magazine.com Read the original article: 8Base Ransomware Site Seized, Phobos Suspects Arrested in Thailand
New York Bans DeepSeek Over Potential Data Risks
New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on government-issued devices and networks. The decision stems from escalating concerns over potential foreign surveillance and censorship risks associated with the…
Trusted Encryption Environments
Really good—and detailed—survey of Trusted Encryption Environments (TEEs.) This article has been indexed from Schneier on Security Read the original article: Trusted Encryption Environments
SAP Security Update – 19 Vulnerabilities Across Multiple Products Patched
SAP has released 19 new Security Notes and two updates to existing patches in its February 2025 Security Patch Day, targeting high-risk vulnerabilities across its product suite. The updates include fixes for cross-site scripting (XSS), authentication bypasses, and authorization flaws…
Discord Unveils New Privacy Feature to Ignore Users Without Knowing Them
Discord has introduced a groundbreaking privacy feature called “Ignore.” This announcement coincides with Safer Internet Day 2025, celebrated globally on February 11, which emphasizes creating a safer and more responsible digital environment. The inclusion of Ignore demonstrates Discord’s recognition of…
Alabama Man Pleads Guilty to Hacking SEC’s X Account
Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek. This article has been indexed from…
EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS
Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical organizations globally. Unlike common malware, APTs employ evasive tactics, techniques, and procedures (TTPs) to remain undetected for extended periods. Their command-and-control (C&C) communications often mimic legitimate…
Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on the X, there has been a surge in the registration of Valentine’s Day-themed domains, many of which are likely being…
IllusionCAPTCHA – A Security Mechanism To Stop AI-Based Breaking CAPTCHA
In the ongoing battle between cybersecurity and AI, researchers have introduced a groundbreaking innovation, IllusionCAPTCHA, a CAPTCHA system that leverages visual illusions to differentiate between human users and AI bots. This novel approach aims to counter the increasing threat of…
US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave
Staffers at the nation’s cybersecurity agency whose job is to ensure the security of US elections have been placed on administrative leave. The post US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave appeared first…
Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks
Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most…
Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions
Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC)…
SolarWinds Improves Web Help Desk in Latest 12.8.5 Update
SolarWinds announced the release of Web Help Desk (WHD) version 12.8.5, unveiling a host of new features, updates, and fixes aimed at streamlining IT service management and enhancing security. The update brings significant enhancements to the Purchase Order (PO) section,…
Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat
January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat actor. The group was responsible for 72 attacks globally, a 60% surge compared to previous months, underscoring its aggressive expansion…