Phemedrone info stealer campaign exploits Windows smartScreen bypass Security Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025… rooter January 15, 2024 3 min read 0
Voice Cloning with Very Short Samples Security New research demonstrates voice cloning, in multiple languages, using samples… rooter January 15, 2024 1 min read 0
Navigating the Digital Shadows with RATs Security The Stealthy World of Remote Access Trojans A Cautionary Tale… rooter January 15, 2024 1 min read 0
Balada Injector continues to infect thousands of WordPress sites Security Balada Injector malware infected more than 7100 WordPress sites using… rooter January 15, 2024 3 min read 0
Attackers target Apache Hadoop and Flink to deliver cryptominers Security Researchers devised a new attack that exploits misconfigurations in Apache… rooter January 15, 2024 2 min read 0
Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic Security Apple addressed a recently disclosed Bluetooth keyboard injection vulnerability with… rooter January 15, 2024 2 min read 0
Attacks against Denmark ‘s energy sector were not carried out by Russia-linked APT Security Forescout experts questioned the attribution of cyber attacks that targeted… rooter January 14, 2024 5 min read 0
Mastermind behind 1.8 million cryptojacking scheme arrested in Ukraine Security The National Police of Ukraine, with the support of Europol,… rooter January 14, 2024 2 min read 0
Lessons from SEC’s X account hack – Week in security with Tony Anscombe Security The cryptocurrency rollercoaster never fails to provide a thrilling ride… rooter January 14, 2024 1 min read 0
Security Affairs newsletter Round 454 by Pierluigi Paganini – INTERNATIONAL EDITION Security A new round of the weekly SecurityAffairs newsletter arrived! Every… rooter January 13, 2024 3 min read 0