A critical local privilege escalation vulnerability has been identified in the GNU C Library (glibc), affecting…
Category: Security
SSH3 – Faster & Rich Secure Shell Using HTTP/3
Secure Shell (SSH), the protocol for secure remote access and data transfer, has evolved with the…
Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years
An advanced cyber espionage group with ties to China, known as UNC3886, has been exploiting a…
Researcher uncovers one of the biggest password dumps in recent history
Troy Hunt, the operator of Have I Been Pwned?, has identified a significant data breach involving…
GitHub is being hijacked by hackers, and it isn’t going to be fixed any time soon
Cybercriminals are exploiting GitHub, a widely-used platform for code and file sharing, to carry out their…
WhiteRabbitNeo: cybersecirity model series
WhiteRabbitNeo, a new AI model series designed for cybersecurity applications, has launched its 33B model in…
Ubisoft reportedly stopped hackers from stealing 900GB of data in a breach this week
Ubisoft suffered a security breach this week, with hackers attempting to steal 900GB of data, including…
PsFree – Webkit exploit for PS4 6.00 to 9.60 and PS5 1.00 to 5.50 + QuickHEN toolkit announced – Wololo.net
Developer CelesteBlue has announced PsFree, a new Webkit exploit for PS4 and PS5, based on CVE-2022-22620.…
Signal details costs of keeping its private messaging service alive | TechCrunch
Signal, the end-to-end encrypted messaging app, spends around $33 million annually to maintain its privacy systems…
Cloudflare, Google and AWS Disclose HTTP/2 Zero-Day Vulnerability
Cloudflare, Google, and AWS have disclosed a new zero-day vulnerability attack, “HTTP/2 Rapid Reset,” which exploits…
Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments
Kinsing threat actors are exploiting a newly disclosed Linux flaw, Looney Tunables, to breach cloud environments.…
Asahi Linux finds macOS bug that leaves machines unbootable
Asahi Linux has discovered a combination of bugs in Apple’s macOS that could render hardware difficult…
New CVSS 4.0 vulnerability severity rating standard released
The Forum of Incident Response and Security Teams (FIRST) has launched CVSS v4.0, the latest version…
Researchers Uncover Wiretapping of XMPP-Based Instant Messaging Service
A lawful interception attempt has been discovered on the XMPP-based messaging service, jabber[.]ru. The six-month-long attack…
Hackers can force iOS and macOS browsers to divulge passwords and much more
Researchers have discovered an attack, named iLeakage, that exploits a side channel vulnerability in Apple’s A-…
Now Android and Windows devices aren’t safe from Flipper Zero either
The Flipper Zero, a multi-tool device for hackers, can now target Android and Windows devices with…
Backdoor Implanted on Hacked Cisco Devices Modified to Evade Detection
A threat actor has modified a backdoor implanted on Cisco devices, making it invisible to previous…
Breyer on chat control investigative research: EU Commissioner as double agent of foreign interference
A campaign supporting the EU’s proposed child sexual abuse regulation, which includes controversial “chat control” measures,…
OpenAI’s flagship AI model has gotten more trustworthy but easier to trick
OpenAI’s GPT-4 language model is more trustworthy but also more susceptible to jailbreaking and bias than…