AMD and Dell Technologies revealed a new lineup of commercial laptops and desktops powered by AMD’s cutting-edge Ryzen AI PRO processors. This collaboration marks a significant milestone in the two
All posts by admin
5th January and The Tale of Joshi Virus: India’s First Global Computer Virus
A throwback to January 5, 1990, marks the day the Joshi virus was unleashed — a significant event in the realm of technology and cybersecurity. Originating in India, the Joshi
Hackers Weaponize Pentesting Tools With Malicious npm, PyPI, & Ruby Packages
Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage attacks, establish command and control (C2) channels, and exfiltrate sensitive
Nikki-Universal Cyber Attack – Hackers Claim 761.8 GB of Data Stolen
Nikki-Universal Co. Ltd., a prominent chemical manufacturer, has fallen victim to a sophisticated ransomware attack. The incident, which the company confirmed on December 27, 2024, involved the encryption of electronic
US Sanctions Chinese Company for Supporting Flax Typhoon Hacker Group
On Friday, the U.S. Department of the Treasury announced sanctions against Integrity Technology Group, a Beijing-based cybersecurity firm accused of aiding a state-sponsored hacking collective known as Flax Typhoon. The
ASUS Routers Vulnerabilities Allows Arbitrary Code Execution
ASUS, a leading networking equipment manufacturer, has issued a critical security advisory for several router models. The company has identified injection and execution vulnerabilities in certain firmware series that could
Top Sophisticated Cyber Security Threats of 2024
As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading interactive malware analysis platform, has
Three Russian Nationals Charged for Espionage & Sabotage Activities
German authorities have charged three Russian-German nationals with espionage and sabotage activities aimed at undermining Germany’s military support for Ukraine. The Federal Prosecutor’s Office filed charges against Dieter S., Alexander
Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys
Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory. This vulnerability underscores the risks associated with physical
PoC Exploit Tool Released for Critical Windows LDAP Zero-click RCE Vulnerability
SafeBreach Labs’ researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked as CVE-2024-49112. The flaw, disclosed by Microsoft on December 10,