April 28, 2024
Articles CyberSecurity Technology

British Cyber Agency warns of Russian and Iranian Hackers Targeting Key Industries

On Thursday, the U.K. National Cyber Security Centre (NCSC) issued a warning about spear-phishing attacks carried out by state-sponsored actors in Iran and Russia. SEABORGIUM (also known as Callisto, COLDRIVER, and TA446) and APT42 were blamed by the agency for the intrusions (aka ITG18, TA453, and Yellow Garuda). Despite the parallels in the ways the […]

Read More
Articles CyberSecurity Technology

Over 4,500 Worldpress Sites Hacked to Redirect Visitors to Sketchy Ad Pages

A massive campaign has infected more than 4,500 WordPress websites as part of a running operation that has been believed to be active since 2017. According to owner of Godadddy,Sucuri the infections involve the injection of a JavaScript hosted on domain named “track[.]violetlovelines[.]com that is designed to redirect visitors to some unwanted sites. The latest […]

Read More
Articles CyberSecurity Technology

Chinese Hackers Utilize Golang Malware in Dragon Spark Attacks

Organizations in East Asia are targeted by likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers. Chinese hackers utilize malware and attacks are characterized by use of open source SparkRAT and malware which attempts to evade detection through a Golang source code interpretation. A striking aspect of the intrusions is […]

Read More
Articles CyberSecurity Technology

Emotet Malware Makes a Comeback with New Evasion Technique

The Emotet malware operation has continued to refine its tactics in a effort to fly under the radar while acting as a conduit for other dangerous malware such as Bumblebee and IcedID. Emotet which is officially reemerged in late 2021 after which a coordinated takedown of its infrastructure by authorities earlier that year which has […]

Read More
Articles CyberSecurity Technology

Apple issues Update for older Devices

Apple has fixes for a recently disclosed critical security flaw that is affecting older devices which is reciting evidence of active exploitation. The issue which is tracked as CVE-2022-42856 and is a type confusion vulnerability in the WebKit browser engine that could result in arbitrary code execution when processing maliciously crafted web content. While it […]

Read More
Articles CyberSecurity Technology

Samsung Galaxy Store App Vulnerable to Sneaky App Install

Two security flaws has disclosed in Samsung’s Galaxy Store app for Android that are exploited by a local attacker to install arbitrary apps to fraudulent landing pages on the web. The issues that tracked as CVE-2023-21433 and CVE-2023-21434, were discovered by NCC Group which is notified to the South Korean chaebol in November and December […]

Read More
CyberSecurity Technology

Chinese Hackers Exploited Recent Fortinet Flaw

Suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks which are targeting a European government entity and a managed service provider (MSP)that is located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates that the exploitation is occurred as early as October 2022which is at least […]

Read More
Articles Technology

The Most Awaited ChatGPT API by OpenAI set to Release Soon – A Game Changer in AI-Powered Language Generation

OpenAI, the leading AI research organization, is soon set to release the much-awaited ChatGPT API. This powerful language model is trained on a massive dataset of internet text and can generate natural-sounding text in a variety of styles and formats. With the ability to understand context, ChatGPT can generate text that is relevant to a given topic or conversation. The release of the API will make it easy for developers and businesses to integrate the model into their own systems and applications, unlocking the potential for a range of applications such as chatbots, automated customer service, and content creation. Get ready to experience the advancements in AI-powered language generation with OpenAI’s ChatGPT API.

Read More
Articles Technology

Manufacturing Workflow in ERPNEXT

Manufacturing workflow in ERPNEXT involve series of things which are important for manufacturing a product. It involves creating new item,then add details of customer , supplier of rawmaterials,creating bills of material ,production plan,sales and order and purchase order for item and then add rate for delivery so that manufacturing product can be ready for delivering […]

Read More
Articles CyberSecurity Technology

Warning for Android Users,New Hook Malware with RAT Capabilities Emerges

The threat actor behind the BlackRock and ERMAC Android banking trojans has uncovered yet another malware for rent called Hook which introduces new capabilities to access files that are stored in the devices and create a remote interactive session. Hook as a novel ERMAC fork which is advertised for sale for $7,000 per month while […]

Read More
en_CAEnglish (Canada)