Rapidly Information Technology News
The developers of the anonymous operating system Tails have released an urgent update, version 6.8.1, which addresses a critical security vulnerability in the Tor browser. The key change is the update of Tor Browser...
On July 10, 2024, Palo Alto issued an advisory regarding vulnerability CVE-2024-5910, which allowed attackers to remotely reset administrator credentials in the Expedition application. Though not widely known, Expedition is designed to facilitate and...
In recent days, robot vacuum cleaners have been hacked across the United States, as reported by ABC News. Hackers not only gained control over the devices but also used their speakers to issue offensive...
Educational institutions have increasingly become frequent targets of cyberattacks, facing thousands of incidents each week. According to Microsoft’s May “Cyber Signals” report, this sector ranked third in the number of attacks during the second...
Security researchers from Sophos X-Ops have discovered that hacking groups are actively exploiting a critical vulnerability in the Veeam Backup & Replication (VBR) system, enabling attackers to remotely execute code on vulnerable servers. The...
GitLab has released security updates for both its Community Edition (CE) and Enterprise Edition (EE), addressing eight vulnerabilities, including a critical flaw that could allow the execution of CI/CD pipelines on arbitrary branches. One...
Thousands of machine learning tools, including developments from major tech companies, have become accessible online, allowing anyone to interact with them and potentially expose confidential data. A security researcher shared his findings with 404...
The number of malicious packages within the open-source ecosystem has surged dramatically over the past year, as highlighted by a recent report from Sonatype. Experts noted that the volume of malicious components deliberately uploaded...
U.S. intelligence agencies are warning of cyberattacks by Iranian hackers aimed at undermining trust in the upcoming U.S. elections. According to experts, political campaign staff are particularly vulnerable, becoming prime targets for these malicious...
Security researchers from Jscrambler have uncovered a new digital skimming campaign that exploits Unicode characters, many of which are invisible, to conceal a malicious code known as Mongolian Skimmer. The primary objective of this...
Experts at Dr.Web have uncovered a large-scale campaign to distribute malware designed for cryptocurrency mining and theft. The attackers disguised the malicious software as office applications, game cheats, and bots for online trading, distributing...
In the Khmelnytskyi region of Ukraine, law enforcement has dismantled the operations of a VPN service that enabled access to Russian websites, circumventing sanctions. The organizer was found to be a 28-year-old man who...