cybersecurity (Page 61)

Using rooted devices has become a way to employ advanced hacking tools without using a powerful computer. However, the rooting process can be complicated for the uninitiated. On this occasion,Read More →

Determining the location of a device is one of the most complex hacking tasks, although there are several tools that can incredibly simplify this process, reducing everything to a matterRead More →

CrowdStrike researchers report the detection of a hacking group operating from China and that has managed to infiltrate an academic institution by exploiting one of the flaws found in theRead More →

Cybersecurity specialists report the detection of various malicious campaigns based on the abuse of a component in Microsoft Build Engine (MSBuild) in order to execute a Cobalt Strike payload onRead More →

Specialists from an Iranian security firm report the discovery of a one-of-a-kind rootkit hidden within the firmware of HP Integrated Lights-Out (HP iLO) devices, abused in the wild to eraseRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

Amazon announced an emergency update for its Alexa voice assistant after a ten-year-old girl asked the famous voice for a challenge to meet, to which Alexa responded by challenging theRead More →

Many may not know it, but in addition to having access to the apps available in the Google Play Store, users of Samsung devices can download and install the applicationsRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →