Category cyber-attacks

Critical Vulnerability Found in Signal Messaging App for Windows and Linux

Recent analysis has uncovered a critical vulnerability within the Signal messaging application for Windows and Linux systems. This flaw poses a significant threat, as it could potentially enable remote attackers to execute arbitrary code on the target’s device merely through message transmission—eliminating the need for any user interaction to instigate…

Read MoreCritical Vulnerability Found in Signal Messaging App for Windows and Linux

ICE Leverages Palantir’s AI Tools for Tip Management

ICE Implements AI-Enhanced Tip Processing System with Palantir’s Technology The U.S. Immigration and Customs Enforcement (ICE) has begun utilizing generative artificial intelligence (AI) tools developed by Palantir to enhance its immigration enforcement operations. According to a recent inventory published by the Department of Homeland Security (DHS), this AI system is…

Read MoreICE Leverages Palantir’s AI Tools for Tip Management

Understanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Security researchers have urgently disclosed a set of vulnerabilities affecting email clients that utilize two prominent email encryption standards, PGP and S This disclosure follows the inadvertent leak of their forthcoming research paper, which was initially scheduled for release tomorrow. PGP and S/MIME serve as widely adopted end-to-end encryption protocols,…

Read MoreUnderstanding How eFail Attacks Exploit PGP and S/MIME Encrypted Emails

Nethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests

Recent advancements in cyber-attack methodologies have seen the emergence of a novel network-based variant of the notorious Rowhammer attack, referred to as “Nethammer.” This approach exploits vulnerabilities in dynamic random access memory (DRAM) through network cards, and it capitalizes on remote direct memory access (RDMA) channels to manipulate memory states…

Read MoreNethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests

DNS Hijacking Malware Targeting Users on iOS, Android, and Desktop Platforms Globally

Roaming Mantis Malware Expands Targeting Capabilities to iOS Users and Desktops Recent reports indicate a significant evolution in the Roaming Mantis malware campaign, which previously focused on compromising Android devices through DNS hijacking. This malware has now broadened its target scope, reportedly affecting iOS devices and desktop users. Researchers from…

Read MoreDNS Hijacking Malware Targeting Users on iOS, Android, and Desktop Platforms Globally

Surge of Scam Spam Originating from an Authentic Microsoft Address

Recent reports indicate that emails originating from a legitimate Microsoft address—which the company recommends customers add to their allow lists—are being utilized to distribute scam content. The emails are sent from [email protected], an address associated with Power BI. This platform provides analytics and business intelligence, integrating insights from various sources…

Read MoreSurge of Scam Spam Originating from an Authentic Microsoft Address

Researchers Discover Massive Botnet Army of 500,000 Compromised Routers

Recent cybersecurity developments have unveiled a sophisticated IoT botnet malware known as VPNFilter, which has reportedly compromised over 500,000 routers and storage devices globally. This malware is believed to be the product of a state-sponsored group based in Russia, indicating not just technical proficiency but also a targeted intent towards…

Read MoreResearchers Discover Massive Botnet Army of 500,000 Compromised Routers