Rapidly Information Technology News
In Japan, a data breach at a support center for victims of the yakuza has raised serious concerns over the potential physical safety of those affected. The incident occurred at the Kumamoto Prefecture Center...
The Thai police apprehended a van used to disseminate mass phishing SMS messages and arrested its driver. The messaging device, located in Bangkok, was capable of sending over 100,000 messages per hour within a...
Recently, users of Windows 11 version 24H2 encountered a significant issue: several popular Ubisoft games became unresponsive either upon launch or during gameplay. In some instances, the screen goes black, while in others, titles...
South Korean police have confirmed the involvement of hackers linked to North Korean intelligence in a major Ethereum cryptocurrency theft in 2019. At the time, the stolen assets were valued at $41.5 million. More...
Ubuntu Linux has come under scrutiny following the discovery of long-standing vulnerabilities in the needrestart utility, which has been in use since 2014. These flaws enable attackers with local access to elevate privileges to...
Before 1994, most scanning technologies relied on one-dimensional barcodes, capable of storing only up to 80 alphanumeric characters. Denso Wave revolutionized this with the invention of QR codes, expanding storage capacity to 7,000 numeric...
A new Linux backdoor, dubbed WolfsBane, has been discovered, which researchers believe to be a port of Windows malware previously deployed by the China-based hacking group Gelsemium. Analysis reveals WolfsBane to be a sophisticated...
The fintech company Finastra has fallen victim to a cyberattack resulting in the theft of over 400 GB of data. The breach occurred on its internal data transfer platform. A hacker operating under the...
The United States Coast Guard has issued a warning regarding Chinese-made port cranes, citing “embedded vulnerabilities” that could grant the Chinese government remote access to their control systems. These cranes, manufactured by Chinese state-owned...
A vulnerability has been discovered in the 7-Zip file compression tool, enabling attackers to remotely execute malicious code through specially crafted archives. To address the issue, the developers have released an update, which must...
Hackers exploited two zero-day vulnerabilities in Palo Alto Networks’ software, compromising potentially thousands of organizations worldwide. The flaws, identified within the PAN-OS operating system that powers next-generation firewalls, enabled attackers to gain administrative access...
Researchers from Unit42 have uncovered a new strain of malware, FrostyGoop, targeting Industrial Control System (ICS) devices. This sophisticated malware exploits the Modbus TCP protocol to execute attacks on critical infrastructure, including facilities in...