23 Dec, 2024

Fortinet confirms data breach after hacker claims to steal 440GB of files

Cybersecurity giant Fortinet has confirmed it suffered a data breach after a threat actor claimed to steal 440GB of files from the company’s Microsoft Sharepoint server. Fortinet is one of the largest cybersecurity companies in the world, selling secure networking products like firewalls, routers, and VPN devices. The company also offers SIEM, network management, and EDR/XDR […]

2 mins read

Fake password manager coding test used to hack Python developers

Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware. The attacks are part of the ‘VMConnect campaign’ first detected in August 2023, where the threat actors targeted software developers with malicious Python packages uploaded onto the PyPI repository. According […]

3 mins read

Adobe fixes Acrobat Reader zero-day with public PoC exploit

A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit. The flaw is tracked as CVE-2024-41869 and is a critical use after free vulnerability that could lead to remote code execution when opening a specially crafted PDF […]

3 mins read

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software

The RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to disable endpoint detection and response (EDR) services on target systems. After taking down the defenses, RansomHub deployed the LaZagne credential-harvesting tool to extract logins from various application databases that could help move laterally on the network. TDSSKiller abused in ransomware attacks Kaspersky […]

2 mins read

What Is ATX 3.0? Everything To Know About ATX3 Power Supplies

The often overlooked power supply unit (PSU) of our computers is getting a major upgrade with the introduction of ATX 3.0. The new ATX 3.0 power supply unit features a 16-pin power cable and comes with a range of new features, marking a significant advancement in PC power supplies. This upgrade is set to revolutionize […]

20 mins read

Flipper Zero releases Firmware 1.0 after three years of development

After three years of development, the Flipper Zero team has announced the release of the first major firmware version for the portable, customizable hacking device. Flipper Zero is a programmable device for pentesters that has faced controversy after users posted videos online showcasing illegal activities. Because of this, the gadged has been banned or restricted in some […]

3 mins read

New PIXHELL acoustic attack leaks secrets from LCD screen noise

A novel acoustic attack named ‘PIXHELL’ can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to. In a PIXHELL attack, malware modulates the pixel patterns on LCD screens to induce noise in the frequency range of 0-22 kHz, carrying encoded signals within those acoustic waves that can […]

3 mins read

How to Protect Your iPhone and Data from Theft

When your iPhone gets stolen, it’s natural to fear that a thief might unlock it and access your personal data. Yes, a thief can unlock your iPhone, but it’s complicated and often requires specific methods or tools. They might use your phone’s IMEI number to request an unlock or try to bypass the passcode using certain tricks. […]

6 mins read

DuckDuckGo vs Google: Best Search Engine for Privacy and Speed

Google and DuckDuckGo are two popular search engines, each with its strengths and weaknesses. This comparison looks at their differences in privacy, search results, features, interface, and more to help you decide which search engine is best for you. Your choice of search engine can affect your web browsing experience. Google is the dominant player, […]

6 mins read