Aggregator
Report: Top Trump Officials' Private Data Leaked
Private contact details of top Trump officials, including their phone numbers, emails and even some passwords, have been leaked online through commercial databases and hacked data dumps, raising security concerns over potential foreign access to Cabinet members' private accounts and communications.
Gamaredon Hacker Group Using Weaponize LNK Files To Drop Remcos Backdoor on Windows
A sophisticated cyber espionage campaign targeting Ukrainian entities has been uncovered, revealing the latest tactics of the Russia-linked Gamaredon threat actor group. The attackers are leveraging weaponized LNK files disguised as Office documents to deliver the Remcos backdoor malware, utilizing themes related to troop movements in Ukraine as a social engineering lure to trick victims […]
The post Gamaredon Hacker Group Using Weaponize LNK Files To Drop Remcos Backdoor on Windows appeared first on Cyber Security News.
46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings
Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale. A recent investigation revealed 46 new vulnerabilities across three of the world’s top 10 solar inverter vendors, exposing systemic weaknesses in these increasingly essential components of […]
The post 46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings appeared first on Cyber Security News.
PhantomPyramid: новый бэкдор на Python атакует российское машиностроение
Signal: Мессенджер, которому доверяют в ЦРУ
DeBackdoor – Framework to Detect Backdoor Attacks on Deep Models
In an era where deep learning models increasingly power critical systems from self-driving cars to medical devices, security researchers have unveiled DeBackdoor, an innovative framework designed to detect stealthy backdoor attacks before deployment. Backdoor attacks, among the most effective and covert threats to deep learning, involve injecting hidden triggers that cause models to behave maliciously […]
The post DeBackdoor – Framework to Detect Backdoor Attacks on Deep Models appeared first on Cyber Security News.
CVE-2024-33437 | CSS Exfil Protection 1.1.0 information disclosure (Issue 41)
CVE-2024-34461 | Zenario Twig Snippet Plugin prior 9.5.60437 HEAD/BODY code injection
CVE-2024-27982 | Node.js up to 18.20.0/20.12.0/21.7.2 Header Content-Length request smuggling (Nessus ID 211049)
Генератор хаоса: JPMorgan доказал истинную случайность чисел на квантовом компьютере
Эта батарейка может работать 5730 лет
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
CVE-2024-56711 | Linux Kernel up to 6.12.6 drm_mode_duplicate null pointer dereference (Nessus ID 233479)
Торвальдс устроил разнос из-за мусора в сборке Linux.
Мозг против манипуляций: чему нас не учат в школе, но что решает всё
Вас уже взломали. Просто вы ещё не знаете об этом.
Morphing Meerkat: атаки через MX-записи меняют лицо современного фишинга
Три мира детства в интернете: где ваш ребёнок?
Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence
Artificial intelligence has dramatically transformed the cybersecurity landscape, with red team activities increasingly leveraging sophisticated AI-driven techniques to simulate advanced persistent threats. These AI-enhanced red teams can now automate the process of penetrating targets and collecting sensitive data at unprecedented speeds. The evolution of machine learning, deep learning, and large language models has opened new […]
The post Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence appeared first on Cyber Security News.