Rapidly Information Technology News
Experts at Microsoft have discovered that the group Peach Sandstorm, linked to Iranian authorities, is deploying a new backdoor named Tickler in attacks targeting satellite communications, the oil and gas sector, and government entities...
CYFIRMA has discovered a new malicious program called the Mekotio Trojan, which is actively spreading among users worldwide. This sophisticated Trojan employs PowerShell technology to infiltrate computers and steal confidential information. According to the...
The South Korean police have initiated an investigation into Telegram on suspicion of facilitating crimes involving deepfake technology. This was announced by Woo Jong-soo, Director of the National Investigation Agency, during a regular press...
The Australian Cyber Security Centre (ACSC) has issued a warning to organizations about the escalating threat posed by malware known as “infostealers.” These malicious programs harvest sensitive data from users’ devices, including passwords, credit...
The German air traffic control service, Deutsche Flugsicherung (DFS), fell victim to a cyberattack that crippled the company’s office communications. However, air traffic control operations remained unaffected. It is reported that the hacker group...
On July 28, 2024, Venezuela held presidential elections that immediately captured the attention of the global community. The National Electoral Council of Venezuela (CNE) declared the victory of the incumbent president, Nicolás Maduro. However,...
Researchers have uncovered a vulnerability in the aviation security system that allowed unauthorized individuals to bypass airport security checks and gain access to aircraft cockpits. During their investigation, Ian Carroll and Sam Curry identified...
Digital analytics tools, such as URL shorteners, geolocation services, and CAPTCHA, play a pivotal role in the modern internet, assisting system administrators in managing traffic and enabling marketers and advertisers to deliver content to...
Mastercard continues to intensify its efforts to eliminate the use of credit card numbers in online purchases, aiming to reduce the incidence of internet fraud. The company has already successfully replaced card numbers with...
Google experts documented several cyberattacks on Mongolian government websites between November 2023 and July 2024. Hackers exploited vulnerabilities in iOS and Android to steal user data. The watering hole attacks involved attempts to compromise...
The North Korean hacker group Kimsuky continues to escalate its operations, employing increasingly sophisticated techniques to bypass security systems. Since 2018, the group’s malicious campaign, code-named BabyShark, has shown a constant evolution: where the...
Truesec specialists have revealed the emergence of a new cybercriminal group, Cicada3301, which, operating under the RaaS model, has already targeted 19 victims worldwide, leaving cybersecurity researchers perplexed. The name Cicada3301 is borrowed from...