Cybersecurity

Critical ‘BatBadBut’ Rust Vulnerability Exposes Windows Systems to Attacks

Apr 10, 2024NewsroomSoftware Security / Vulnerability A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks. The vulnerability, tracked as CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with […]

DJing

Premiere: Stefan Goldmann’s jagged, polyrhythmic grooover ‘Yantra’ | Juno Daily

Advance listen from the Berlin producer’s Alluvium LP Alluvium is the third in Berlin-based experimental producer Stefan Goldmann’s series of albums exploring the “first principles” research of metric asymmetry. Exploring new structural paths for machine rhythm in irregular metres, the album seems non-binary patterns running simultaneously, moving in and out of interlocking focus, across 12 […]

Cybersecurity

10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet

Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report […]

Cybersecurity

Professionally Hooked: Microsoft Two-Step Phishing Campaign Targets LinkedIn Users – Perception Point

The Rise of Social Media as a Browser Security Challenge In the modern workspace the lines between professional and personal digital spaces are becoming increasingly blurred. Popular social media platforms like Facebook, LinkedIn and WhatsApp, once relegated to the realm of personal interaction, have long been integrated into the fabric of daily corporate communication and […]

Cybersecurity

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

Apr 09, 2024NewsroomCyber Espionage / Malware Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users. Cisco Talos is tracking the activity cluster under the name Starry […]