Grayshift Announces Android Support To Its GrayKey iPhone Hacking Tool
Grayshift, an Atlanta-based startup that made its name with the GrayKey hacking apparatus that breaks Apple's iPhone guards, presently formally does likewise for Google's...
Albanian Parliament and One Albania Telecom Hit by Cyber Attacks
The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country's National Authority for Electronic...
Microsoft Warns of New ‘FalseFont’ Backdoor Targeting the Defense Sector
Organizations in the Defense Industrial Base (DIB) sector are in the crosshairs of an Iranian threat actor as part of a campaign designed to...
Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that's equipped to bypass security software...
Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services
Three new security vulnerabilities have been discovered in Azure HDInsight's Apache Hadoop, Kafka, and Spark services that could be exploited to achieve privilege escalation...
China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations
A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar."Earth Freybug is...
New Security Vulnerabilities Uncovered in pfSense Firewall Software – Patch Now
Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could be chained by an attacker to execute...
Latest Bluetooth hacking techniques expose new attack vectors for hackers
BlueBorne is a vulnerability discovered in several Bluetooth implementations.
Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...
WhatsApp Denies in Supreme Court Allegations of Data Hacking by Spyware Pegasus
WhatsApp on Monday denied in the Supreme Court the charges that its information can be hacked by Israeli spyware Pegasus, which had prompted a...
Generative AI Security: Preventing Microsoft Copilot Data Exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet.Copilot is an AI assistant that lives inside each of...