Rapidly Information Technology News
A vulnerability has been discovered in the ChatGPT application for macOS, allowing malefactors to install spyware through the use of the artificial intelligence memory function. Experts have named this technique SpAIware, noting that it...
Google’s initiative to introduce its new advertising technology, Privacy Sandbox, has encountered challenges in the United Kingdom. The Competition and Markets Authority (CMA) has once again voiced concerns over potential anticompetitive implications, resulting in...
WP Engine has dispatched a letter to Automattic’s CEO, Matt Mullenweg, demanding he “cease defamation.” The cause of this action arises from alleged false accusations directed at WP Engine by Mullenweg, along with a...
Llama Group has unveiled the source code of the multimedia player Winamp. Crafted in C++, this code leverages dependencies such as Qt, libvpx, libmpg123, OpenSSL, and the DirectX 9 SDK. The program’s compilation is...
A recent cyberattack on the water treatment facility in Arkansas City, Kansas, compelled local authorities to shift operations to manual control. The incident occurred on the morning of September 22 and was promptly reported...
A new strain of Android malware, dubbed Octo2—a refined iteration of Octo (ExobotCompact)—is proliferating across Europe. According to experts at ThreatFabric, this new version may profoundly alter the cybersecurity landscape. Octo2 represents an evolution...
Two vulnerabilities were discovered in the Houzez theme for WordPress and its associated plugin, Login Register, posing a threat to the security of over 46,000 websites. Researchers from PatchStack identified that these security flaws...
Cyberattacks are becoming increasingly sophisticated, and one of the latest trends shows how attackers are disguising themselves as HR departments of large companies. A recent example of a phishing attack, analyzed by Cofense specialists,...
At the end of August, Kaspersky Lab specialists detected the activity of malware known as Necro, which infiltrated popular applications on the Google Play platform as well as unofficial sources. Necro is an Android...
The official OpenAI account on the social network X was recently targeted by scammers specializing in cryptocurrency schemes. This incident is the latest in a series of similar breaches that have previously affected personal...
ESET has resolved two privilege escalation vulnerabilities in its products for Windows and macOS operating systems. These vulnerabilities allowed attackers to gain unauthorized access to system resources. The first vulnerability, identified as CVE-2024-7400 and...
As of September 20, MoneyGram has suspended the operation of its systems and money transfer services due to a cyber incident. Both offline and online transactions through MoneyGram remain unavailable, and the company has...