Rapidly Information Technology News
Challenges with cyber espionage and supply chain vulnerabilities are prompting African nations to explore strategies for diversifying their technological partnerships. Recent incidents involving backdoor installations and data breaches have underscored the risks of dependency...
The U.S. Department of Justice has proposed that Google be required to divest its Chrome browser to restore competition in the online search market. The potential separation of Android remains on the table as...
U.S. Senator Richard Blumenthal has declared that the operations of American technology companies in China pose a grave threat to U.S. national security. His statement was delivered during a Senate subcommittee hearing focused on...
The Black Lotus Labs team at Lumen Technologies has unveiled a sophisticated operation behind the ngioweb botnet, which serves as the backbone for one of the largest criminal proxy services, NSOCKS. This service leverages...
Experts from Kaspersky Lab uncovered a supply chain attack on software that persisted for nearly a year. Malicious packages, disguised as tools for creating neural network-based chatbots, were distributed via the PyPI repository. Upon...
The FBI, in collaboration with CISA and the Australian Cyber Security Centre (ACSC), has issued an advisory detailing the tactics, techniques, and procedures (TTPs) as well as indicators of compromise (IOCs) associated with the...
MITRE has unveiled an updated list of the 25 most dangerous software vulnerabilities identified among 31,770 CVE entries from June 2023 to June 2024. These vulnerabilities can lead to critical failures, enabling attackers to...
Microsoft has released the preview update KB5046740 for Windows 11 24H2, introducing 14 enhancements and fixes. This update addresses issues related to File Explorer, the clipboard, and secondary displays, while also improving voice functionality...
Security researchers from ThreatFabric have uncovered a novel cash-out tactic dubbed “Ghost Tap.” This method enables cybercriminals to exploit NFC technology for anonymous transactions using stolen credit card data linked to mobile payment platforms...
A new Gen Digital security threat report for Q3 has revealed a rapidly evolving threat landscape. Key trends include a surge in social engineering attacks, a significant increase in ransomware incidents, and the emergence...
A new ransomware operation known as Helldown is gaining momentum in cyberspace, reportedly exploiting vulnerabilities in Zyxel firewalls to infiltrate corporate networks. According to the French cybersecurity firm Sekoia, these attacks enable criminals to...
Trend Micro has uncovered a new cyber threat campaign in which the Water Barghest group transforms thousands of vulnerable IoT devices into proxy networks within minutes of their compromise. Since 2020, the attackers have...