21 Sep, 2024

Adobe fixes Acrobat Reader zero-day with public PoC exploit

A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit. The flaw is tracked as CVE-2024-41869 and is a critical use after free vulnerability that could lead to remote code execution when opening a specially crafted PDF […]

3 mins read

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software

The RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to disable endpoint detection and response (EDR) services on target systems. After taking down the defenses, RansomHub deployed the LaZagne credential-harvesting tool to extract logins from various application databases that could help move laterally on the network. TDSSKiller abused in ransomware attacks Kaspersky […]

2 mins read

What Is ATX 3.0? Everything To Know About ATX3 Power Supplies

The often overlooked power supply unit (PSU) of our computers is getting a major upgrade with the introduction of ATX 3.0. The new ATX 3.0 power supply unit features a 16-pin power cable and comes with a range of new features, marking a significant advancement in PC power supplies. This upgrade is set to revolutionize […]

20 mins read

Flipper Zero releases Firmware 1.0 after three years of development

After three years of development, the Flipper Zero team has announced the release of the first major firmware version for the portable, customizable hacking device. Flipper Zero is a programmable device for pentesters that has faced controversy after users posted videos online showcasing illegal activities. Because of this, the gadged has been banned or restricted in some […]

3 mins read

New PIXHELL acoustic attack leaks secrets from LCD screen noise

A novel acoustic attack named ‘PIXHELL’ can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to. In a PIXHELL attack, malware modulates the pixel patterns on LCD screens to induce noise in the frequency range of 0-22 kHz, carrying encoded signals within those acoustic waves that can […]

3 mins read

How to Protect Your iPhone and Data from Theft

When your iPhone gets stolen, it’s natural to fear that a thief might unlock it and access your personal data. Yes, a thief can unlock your iPhone, but it’s complicated and often requires specific methods or tools. They might use your phone’s IMEI number to request an unlock or try to bypass the passcode using certain tricks. […]

6 mins read

DuckDuckGo vs Google: Best Search Engine for Privacy and Speed

Google and DuckDuckGo are two popular search engines, each with its strengths and weaknesses. This comparison looks at their differences in privacy, search results, features, interface, and more to help you decide which search engine is best for you. Your choice of search engine can affect your web browsing experience. Google is the dominant player, […]

6 mins read

How to Play League of Legends on a Chromebook

If you have a Chromebook (or your school provided you with one) you can most likely play League of Legends on it, unless it’s completely locked down. There are different methods like cloud gaming, installing Linux, or using the Android app to get the game up and running on your system. Each method will have […]

4 mins read

Chinese hackers use new data theft malware in govt attacks

New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and malware called FDMTP and PTSOCKET to download payloads and steal information from breached networks. Researchers found that the hackers are using a variant of the HIUPAN worm to deliver the PUBLOAD malware stager through removable […]

3 mins read