Cybersecurity Blog
Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds
Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba’s ...
TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been ...
The Golden Age of Automated Penetration Testing is Here
Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in ...
New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the “wall” ...
PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) ...
Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries
Mar 28, 2024NewsroomLinux / Network Security A Linux version of a multi-platform backdoor called DinodasRAT has been ...
Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack
Mar 28, 2024NewsroomCyber Espionage / Malware The Police of Finland (aka Poliisi) has formally accused a Chinese ...
New ZenHammer Attack Bypasses RowHammer Defenses on AMD CPUs
Mar 28, 2024NewsroomHardware Security / Vulnerability Cybersecurity researchers from ETH Zurich have developed a new ...