Tag: Researchers
-
Researchers Uncover Tools And Tactics Used By Chinese Hackers
Over the years, several reports associated with cybercriminals have been based in Russia and Western countries. This is due to the fact …
-
Researchers Exposed Predator Spyware Infrastructure & Domains Associated
The Predator Files project, coordinated by the European Investigative Collaborations (EIC), has highlighted the extensive use of Predator …
-
Researchers Use Raspberry Pi Pico to Crack BitLocker Under a Minute
BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access in …
-
Researchers Uncover DiceLoader Malware Used to Attack Corporate Business
Researchers created a fake Diceloader C2 for further investigation, revealing the communication type between the malware and the C2 server. …
-
Researchers Unvield the Sophisticated Ransomware Used by Black Hunt
The Black Hunt ransomware has recently become a significant threat to the cybersecurity landscape. This malicious software has already …
-
Researchers discover exposed API secrets, impacting major tech tokens
Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets were …
-
Researchers remotely exploit devices used to manage safe aircraft landings and takeoffs
Criminals could remotely tamper with the data that apps used by airplane pilots rely on to inform safe takeoff and landing procedures, …
-
Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords
A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager (NTLM) v2 hashed passwords …
-
Researcher uncovers one of the biggest password dumps in recent history
Nearly 71 million unique credentials stolen for logging into websites such as Facebook, Roblox, eBay, and Yahoo have been circulating on …
-
Researcher uncovers one of the biggest password breaches in recent history
Nearly 71 million unique credentials stolen for logging into websites such as Facebook, Roblox, eBay, and Yahoo have been circulating on …
-
Researchers disclose vulnerability in GPUs from AMD, Apple and Qualcomm
AI models run computations on GPUs using specialized programs called kernels. A kernel can spread out a calculation across a large number …
-
Researchers Uncover Major Surge in Global Botnet Activity
Security researchers have discovered a significant increase in global botnet activity between December 2023 and the first week of January …
●●●