The Ministry of Defence of Ukraine stared using the Clearview AI facial recognition system – in this way, an American startup helps the Ukrainian military to identify Russian opponents, fight disinformation and identify the...
Author - Emma Davis
The developers fixed 16 dangerous vulnerabilities in the UEFI of HP devices
Firmware security company Binarly has discovered more than a dozen UEFI vulnerabilities on HP devices and probably other manufacturers. vulnerabilities were assigned 16 CVE IDs. The errors are stack overflows, heap overflows, and...
Dirty Pipe Vulnerability Allows Rooting Almost All Linux Distributions
Data was disclosed about the vulnerability of local privilege escalation in Linux, called Dirty Pipe. A PoC exploit has also been published for a problem that poses a threat to almost all distributions. with identifier CVE-2022...
Imperva coped with a DDoS attack with a capacity of 2.5 million requests per second
Security firm Imperva reported that they recently copd with a ransomware DDoS attack targeting an unnamed website that peaked at 2.5 million requests per second. The researchers say that an unnamed organization affected by the...
Chinese hack group APT10 attacks Taiwanese financial sector
According to CyCraft, a Taiwanese security company, the Chinese hack group APT10 (aka Stone Panda, MenuPass and Bronze Riverside) has been attacking the local financial sector for many months, exploiting a vulnerability in an...
Privilege escalation vulnerability found in snap-confine
Several vulnerabilities have been found in Snap that is developed by Canonical. The most serious of vulnerabilities, the one in snap-confine, can be used to escalate privileges to gain root privileges. experts talk about the...
US authorities say Russian hackers attacked US defense contractors
The US government said that from January 2020 to February 2022, Russian government hackers regularly attacked and compromised several of the country’s defense contractors. joint official statement was issued by...
Microsoft warns of ice phishing in blockchain and smart contracts
Microsoft has warned of new threats to blockchain and Web3 security, including so-called “ice phishing”. to the Microsoft 365 Defender Research Team, phishing has already “paved the way” for blockchain, custodial...
Researcher shows how to extract text from pixelated images
Bishop Fox lead researcher Dan Petro has demonstrated a method for extracting text from pixelated images. Moreover, it is possible to completely restore the content of the text edited by pixelization. method of text distortion is...
Hack group TA2541 was attacking the aviation and transport sectors for years
Proofpoint specialists discovered a hack group, which was assigned the ID TA2541. The researchers believe that the attackers have been operating since 2017 from Nigeria, and their activity is focused on several industries...