• GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

    GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

    A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head’s XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices. The vulnerability has been codenamed GhostWrite. It has been described as a direct CPU…

    Read More

  • Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

    Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

    Cybersecurity researchers have discovered two security flaws in Microsoft’s Azure Health Bot Service that, if exploited, could permit a malicious actor to achieve lateral movement within customer environments and access sensitive patient data. The critical issues, now patched by Microsoft, could have allowed access to cross-tenant resources within the service, Tenable said in a new…

    Read More

  • Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

    Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

    Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized. With high-value assets, it’s not good enough to…

    Read More

  • FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

    FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

    The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor (aka Radar). The effort saw the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Dispossessor is said to be…

    Read More

  • Ukraine Warns of New Phishing Campaign Targeting Government Computers

    Ukraine Warns of New Phishing Campaign Targeting Government Computers

    The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security Service of Ukraine to distribute malware capable of remote desktop access. The agency is tracking the activity under the name UAC-0198. More than 100 computers are estimated to have been infected since July 2024, including…

    Read More

  • Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

    Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

    Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets. “The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype…

    Read More

  • Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

    Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

    As many as 10 security flaws have been uncovered in Google’s Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed. “The Quick Share application implements its own specific application-layer communication protocol to support file transfers between nearby,…

    Read More

  • New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

    New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

    An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software. “The trojan malware contains different deliverables ranging from simple adware extensions that hijack searches to more sophisticated malicious scripts that deliver local extensions to steal private data

    Read More

  • Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure

    Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure

    Microsoft has disclosed an unpatched zero-day in Office that, if successfully exploited, could result in unauthorized disclosure of sensitive information to malicious actors. The vulnerability, tracked as CVE-2024-38200 (CVSS score: 7.5), has been described as a spoofing flaw that affects the following versions of Office – Microsoft Office 2016 for 32-bit edition and 64-bit editions…

    Read More

  • Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

    Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

    Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. “The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing sensitive data, data

    Read More