News & Updates

YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader

Cybersecurity researchers have detailed the inner workings of a highly evasive loader named “in2al5d p3in4er” (read: invalid printer) that’s used to deliver the Aurora information stealer malware.
“The in2al5d p3in4er loader is compiled with Embarcadero RAD Studio and targets endpoint workstations using advanced anti-VM (virtual machine) technique,” cybersecurity firm Morphisec said in a report
News & Updates

Army helicopter crash blamed on skipped software patch

The emergency ditching of an Australian military helicopter in the water just
off a beach in New South Wales, has been blamed on the failure to apply a
software patch.

At approximately 9pm on March 23, a MRH-90 Taipan helicopter operated by the
Australian army ditched into Jervis Bay
[https://www.theguardian.com/australia-news/2023/mar/23/ten-soldiers-plucked-from-sea-after-army-helicopter-crash-near-jervis-bay]
, during what should have been a routine counter-terrorism training operation.

Tha

Cybersecurity Tools

Voice Cloning is Becoming a Ransom Threat

Voice impersonation, also known as voice cloning, are becoming an increasingly prevalent threat in the digital landscape. Sophisticated artificial intelligence (AI) technologies can now imitate voices with remarkable accuracy, leading to threats against our privacy and security.
Scroll to Top