12 Feb, 2025

Canada orders TikTok to shut down over national risk concerns

The Canadian government has ordered the dissolution of TikTok Technology Canada following a multi-step review that provided information and evidence of the social media company posing a national risk. The decision also considered advice of Canada’s security and intelligence community as well as other government partners. It does not ban Canadian users’ access to the TikTok […]

3 mins read

HPE warns of critical RCE flaws in Aruba Networking access points

Hewlett Packard Enterprise (HPE) released updates for Instant AOS-8 and AOS-10 software to address two critical vulnerabilities in Aruba Networking Access Points. The two security issues could allow a remote attacker to perform unauthenticated command injection by sending specially crafted packets to Aruba’s Access Point management protocol (PAPI) over UDP port 8211. The critical flaws are […]

2 mins read

Nokia says hackers leaked third-party app source code

Nokia’s investigation of recent claims of a data breach found that the source code leaked on a hacker forum belongs to a third party and company and customer data has not been impacted. The statement comes in response to threat actor IntelBroker earlier this week releasing data belonging to Nokia, allegedly stolen after breaching a third-party vendor’s […]

1 min read

How Monitor Refresh Rates Affect Gaming and PC Performance

Understanding how a monitor functions can significantly improve your viewing experience. One important aspect of display technology is the refresh rate, which is measured in Hertz (Hz). This refers to how many times a monitor updates with new images each second. A higher refresh rate can result in smoother visuals, which is especially important for fast-moving content such […]

5 mins read

Windows 11 Vs Windows 10: Complete Guide to Differences, Performance, and Features

Windows 11 and Windows 10 offer distinct experiences for users. The latest version, Windows 11, brings a fresh look and new features to the table. It sports a centered taskbar and redesigned Start menu, giving the interface a modern feel. Windows 11 focuses on enhancing productivity and gaming performance, but it comes with stricter hardware requirements […]

7 mins read

Germany drafts law to protect researchers who find security flaws

The Federal Ministry of Justice in Germany has drafted a law to provide legal protection to security researchers who discover and responsibly report security vulnerabilities to vendors. When security research is conducted within the specified boundaries, those responsible will be excluded from criminal liability and the risk of prosecution. “Those who want to close IT […]

3 mins read

Hackers increasingly use Winos4.0 post-exploitation kit in attacks

Hackers are increasingly targeting Windows users with the malicious Winos4.0 framework, distributed via seemingly benign game-related apps. The toolkit is the equivalent of Sliver and Cobalt Strike post-exploitation frameworks and it was documented by Trend Micro this summer in a report on attacks against Chinese users. At the time, a threat actor tracked as Void Arachne/Silver Fox lured victims […]

2 mins read

New SteelFox malware hijacks Windows PCs using vulnerable driver

A new malicious package called ‘SteelFox’ mines for cryptocurrency and steals credit card data by using the “bring your own vulnerable driver” technique to get SYSTEM privileges on Windows machines. The malware bundle dropper is distributed through forums and torrent trackers as a crack tool that activates legitimate versions of various software like Foxit PDF Editor, JetBrains and […]

3 mins read

Cisco bug lets hackers run commands as root on UWRB access points

Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points that provide connectivity for industrial wireless automation. Tracked as CVE-2024-20418, this security flaw was found in Cisco’s Unified Industrial Wireless Software’s web-based management interface. Unauthenticated threat actors can exploit it in low-complexity […]

2 mins read