logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Blog

Page 55

Read more

Exploiting a vulnerable Minifilter Driver to create a process killer

February 9, 2024 / 38 / 0
[ad_1] Exploiting a vulnerable Minifilter Driver to create a process killer Pierluigi Paganini February 09, 2024 Researcher demonstrated how to exploit a signed Minifilter Driver in a BYOVD attack to terminate a specific process from the kernel. Exploiting a signed Minifilter Driver that can be... Continue reading
Read more

20 Years of Facebook, but Trust in Social Media Remains Rock Bottom

February 9, 2024 / 32 / 0
[ad_1] February 2024 marks 20 years of Facebook’s existence. Despite the brand being well established worldwide and in our day to day lives, only 6% of people trust it and other social media companies with their personal data. In a survey of 12,000 people across... Continue reading
Read more

Black Basta ransomware gang hacked Hyundai Motor Europe

February 9, 2024 / 27 / 0
[ad_1] Black Basta ransomware gang hacked Hyundai Motor Europe Pierluigi Paganini February 09, 2024 Black Basta ransomware gang claims the hack of the car maker Hyundai Motor Europe and the theft of three terabytes of their data. BleepingComputer reported that the Car maker Hyundai Motor... Continue reading
Read more

AI-Powered Robocalls Banned Ahead of US Election

February 9, 2024 / 38 / 0
[ad_1] The US Federal Communications Commission (FCC) has introduced a ban on robocalls that contain voices generated by AI to protect US voters from spamming ahead of the November presidential election. Callers must obtain prior express consent from the called party before making a call... Continue reading
Read more

Fortinet warns of a new actively exploited RCE flaw in FortiOS SSL VPN

February 9, 2024 / 44 / 0
[ad_1] Fortinet warns of a new actively exploited RCE flaw in FortiOS SSL VPN Pierluigi Paganini February 09, 2024 Fortinet warns that the recently discovered critical remote code execution flaw in FortiOS SSL VPN, tracked CVE-2024-21762, is being actively exploited. Fortinet is warning that the recently discovered... Continue reading
Read more

US Warns of Destructive Chinese Cyber-Attacks

February 9, 2024 / 27 / 0
[ad_1] The US and its allies have sounded the alarm over Chinese state hackers, claiming they’re ready to launch destructive attacks on multiple critical infrastructure (CNI) sectors in the event of a military conflict. The advisory comes from multiple agencies including the FBI, NSA and... Continue reading
Read more

Unraveling the truth behind the DDoS attack from electric toothbrushes

February 9, 2024 / 33 / 0
[ad_1] Unraveling the truth behind the DDoS attack from electric toothbrushes Pierluigi Paganini February 08, 2024 Several media reported that three million electric toothbrushes were compromised and recruited into a DDoS botnet. Is it true? The Swiss newspaper Aargauer Zeitung first published the news of... Continue reading
Read more

France: 33 Million Social Security Numbers Exposed in Health Insurance

February 9, 2024 / 40 / 0
[ad_1] The personal information of 33 million French citizens could be exposed after two French health insurance operators suffered a data breach in early February. Viamedis, France’s leading provider of medical third-party payment, confirmed on February 1 that it had suffered a data breach. Medical... Continue reading
Read more

US offers $10M reward for info on Hive ransomware group leaders

February 8, 2024 / 46 / 0
[ad_1] US offers $10 million reward for info on Hive ransomware group leaders Pierluigi Paganini February 08, 2024 U.S. Government offers rewards of up to $10 million for information that could help locate, identify, or arrest members of the Hive ransomware group. The US Department... Continue reading
Read more

Linux Devs Rush to Patch Critical Vulnerability in Shim

February 8, 2024 / 122 / 0
[ad_1] Linux developers have addressed a new security flaw discovered in Shim, a component crucial for the boot process in Linux-based systems.  This vulnerability poses a significant risk by allowing the installation of malware that operates at the firmware level (secure boot bypass), presenting challenges... Continue reading
Next Page »

Search