Tag: EN

Taiwanese Web Hosting Infrastructure Hit by UAT-7237

  A recent report from Cisco Talos exposes a cyber intrusion by a suspected Chinese-government-backed hacking collective, tracked as UAT-7237, into a Taiwanese web hosting provider. The attackers aimed to steal credentials and implant backdoors, enabling persistent and covert access…

Zero Trust: A Strong Strategy for Secure Enterprise

Zero trust frameworks challenge traditional perimeter-based security models by adopting a “never trust, always verify” approach. Unlike legacy security systems, zero trust requires continuous identity verification, strict least-privilege access controls,… The post Zero Trust: A Strong Strategy for Secure Enterprise…

Why Signalgate Matters

I found this in my files. I no doubt intended to publish it months ago and forgot to finish it and press the button. Senior government officials traditionally restrict defense-related conversations to special locations to prevent eavesdropping. The most secret…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 58

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter From Drone Strike to File Recovery: Outsmarting a Nation State  New Ransomware Charon Uses Earth Baxia APT Techniques to…

ERMAC 3.0 Source Code Leak Reveals Expanding Threat

Hunt.io got ERMAC 3.0’s source code, showing its evolution from Cerberus and Hook, now targeting 700+ banking, shopping, and crypto apps. Hunt.io cybersecurity researchers obtained the full source code of the Android banking trojan ERMAC 3.0, revealing its evolution from…

This simple magnetic trick could change quantum computing forever

Researchers have unveiled a new quantum material that could make quantum computers much more stable by using magnetism to protect delicate qubits from environmental disturbances. Unlike traditional approaches that rely on rare spin-orbit interactions, this method uses magnetic interactions—common in…