Tag: EN

Ukraine strikes Russian bomber-maker with hack attack

Drones are not enough Following a daring drone attack on Russian airfields, Ukrainian military intelligence has reportedly also hacked the servers of Tupolev, the Kremlin’s strategic bomber maker.… This article has been indexed from The Register – Security Read the…

YARA-X 1.0.0: The Stable Release and Its Advantages

Audio version of this post, created with NotebookLM Deep Dive Your browser does not support the audio element. Short note for everyone who already lives and breathes YARA: Victor (aka plusvic) just launched YARA-X 1.0.0. Full details: https://virustotal.github.io/yara-x/blog/yara-x-is-stable/ What changes…

OffensiveCon25 – Garbage Collection In V8

Authors/Presenters: Richard Abou Chaaya and John Stephenson Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations…

Microsoft Launches Free Security Program for European Governments

Microsoft is offering European countries a new cybersecurity program for free to help them defend against threats from nation-states like China and Russia, ransomware gangs, and AI-powered cyber threats through greater intelligence sharing, investments, and partnerships. The post Microsoft Launches…

What is a time-based one-time password?

A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors. This article has been indexed from Search Security Resources and Information from TechTarget Read…

What is a next-generation firewall (NGFW)?

A next-generation firewall (NGFW) is a network security device that combines traditional firewall capabilities with advanced features to detect and block sophisticated cyberattacks. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

Updated Guidance on Play Ransomware

CISA, the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have issued an updated advisory on Play ransomware, also known as Playcrypt. This advisory highlights new tactics, techniques, and procedures used by the…

New Crocodilus Malware That Gain Complete Control of Android Device

A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that grant cybercriminals unprecedented control over infected smartphones. First discovered in March 2025, this malware has rapidly evolved from localized test…

Business Email Compromise Attacks: How To Detect Them Early

Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake login prompt, a cleverly disguised link, and an employee’s credentials are gone. From there, attackers can quietly access inboxes, exfiltrate…

Nokia To Lead EU Robotics, Done Project

PROACTIF project will involve Nokia and 42 firms developing drones and robotics to help protect critical infrastructure in Europe This article has been indexed from Silicon UK Read the original article: Nokia To Lead EU Robotics, Done Project

Hackers Leak 86 Million AT&T Records with Decrypted SSNs

Hackers leak data of 88 million AT&T customers with decrypted SSNs; latest breach raises questions about links to earlier Snowflake-related attack. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original…

Vulnerability Summary for the Week of May 26, 2025

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Daily College Class Work Report Book A vulnerability classified as critical has been found in 1000 Projects Daily College Class Work Report Book 1.0. Affected is an unknown…