The AI Hangover is Here – The End of the Beginning

12/08/2024 0 Comments 0 tags

After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the market corrects the share price of the major players (like

Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

12/08/2024 0 Comments 0 tags

Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and Deye that could enable malicious actors to cause disruption and

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

12/08/2024 0 Comments 0 tags

Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks. The elevated

EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files

12/08/2024 0 Comments 0 tags

The Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind. The

Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

11/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to

Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

10/08/2024 0 Comments 0 tags

As many as 10 security flaws have been uncovered in Google’s Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE)

New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

10/08/2024 0 Comments 0 tags

An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software. “The trojan malware

Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure

10/08/2024 0 Comments 0 tags

Microsoft has disclosed an unpatched zero-day in Office that, if successfully exploited, could result in unauthorized disclosure of sensitive information to malicious actors. The vulnerability, tracked as CVE-2024-38200 (CVSS score:

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

10/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. “The impact of these vulnerabilities range between remote

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

09/08/2024 0 Comments 0 tags

Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). “This attack