Rapidly Information Technology News
A security researcher has uncovered a vulnerability in digital license plates, which are increasingly being adopted in the United States. According to the researcher, exploiting this flaw allows tampering with the displayed license numbers,...
The Chinese hacking group Winnti, also known as APT41, has been employing a new PHP backdoor named Glutton to target organizations in China and the United States, as well as other cybercriminals. The discovery...
Scientists from the University of North Carolina have developed a method called TPUXtract, which enables the reconstruction of neural network structures by analyzing the electromagnetic (EM) signals emitted by processors during operation. This approach...
Microsoft specialists report the blocking of approximately 7,000 password-based attacks every second — nearly double the number recorded a year ago. These figures underscore the urgent need for more robust methods to safeguard user...
The cyber group Clop has claimed responsibility for the recent attacks on Cleo Harmony, VLTrader, and LexiCom platforms, which are utilized for secure file transfers. The attackers exploited the CVE-2024-50623 vulnerability, initially patched in...
Since August 2023, hackers have clandestinely exploited a zero-day vulnerability in DrayTek routers to compromise devices, steal passwords, and subsequently deploy ransomware across connected networks. According to a joint report by Forescout and PRODAFT,...
The Japanese publishing house Kadokawa reportedly paid approximately $2.98 million in cryptocurrency to a hacker group following a large-scale cyberattack in June. An investigation commissioned by Kyodo News and conducted by Unknown Technologies confirmed...
The Canadian company Care1, specializing in the application of artificial intelligence in ophthalmology, has found itself embroiled in a scandal following a data breach. Cybersecurity researcher Jeremiah Fowler uncovered a publicly accessible database of...
The company Vestrans has disclosed a significant cyberattack in which an attacker exploited a vulnerability in the locked staking contract. By manipulating the reward mechanism, the perpetrator illicitly acquired 73,720,000 $VSTR tokens beyond the...
A federal court in Missouri has indicted 14 North Korean nationals for illicitly securing employment with U.S. companies using stolen identities of American citizens. The charges include fraud, money laundering, and identity theft. Over...
Cybersecurity researchers have uncovered a sophisticated new Linux rootkit named PUMAKIT, designed to conceal its presence, escalate privileges, and evade detection by system tools. This loadable kernel module (LKM) employs advanced stealth mechanisms, making...
The Romanian National Cybersecurity Directorate (DNSC) has reported a ransomware attack by the LYNX group targeting the energy company Electrica. The incident occurred on December 9 this year, prompting DNSC specialists to swiftly arrive...