Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba’s ...

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been ...

The Golden Age of Automated Penetration Testing is Here

Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in ...

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the “wall” ...

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) ...

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

Mar 28, 2024NewsroomLinux / Network Security A Linux version of a multi-platform backdoor called DinodasRAT has been ...

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

Mar 28, 2024NewsroomCyber Espionage / Malware The Police of Finland (aka Poliisi) has formally accused a Chinese ...

New ZenHammer Attack Bypasses RowHammer Defenses on AMD CPUs

Mar 28, 2024NewsroomHardware Security / Vulnerability Cybersecurity researchers from ETH Zurich have developed a new ...

1 274 275 276 277 278 279 280 281 282 283 284 660