Introduction: Cloud computing has become an integral part of modern technology, revolutionizing the way we store, access, and process data. With its immense scalability, flexibility, and cost-efficiency, cloud systems have gained widespread popularity across various industries and consumer markets. In this article, we will delve into the world of popular cloud systems, providing an overview […]
Hackers Target Reddit, Demand $4.5 Million and API Modifications Threatening to Release 80GB of Data
In a recent disclosure, Reddit confirmed falling victim to a targeted phishing scheme in February. The attack resulted in the exposure of internal documents, dashboards, code, contracts, and certain personal information of advertisers, as well as past and present employees. Fortunately, none of the compromised data has been made public so far. However, this may […]
Sam Altman, the CEO of OpenAI, expressed optimism on Monday regarding the willingness of world leaders to address the potential risks associated with artificial intelligence (AI) technology being developed by his company and others. As part of his ongoing world tour, Altman visited Tel Aviv, a major tech hub, following visits to several European capitals. […]
Apple has refuted the claims made by Russia’s Federal Security Service (FSB) on Thursday, alleging that the company collaborated with the U.S. National Security Agency (NSA) to conduct surveillance on Russian iPhone users. In a statement provided to the media, Apple firmly stated that it has never engaged in any cooperation with any government to […]
Dark Pink APT hacking group remains highly active, targeting government, military, and education organizations in Indonesia, Brunei, and Vietnam. Their recent attacks show a revamped chain, new persistence mechanisms, and updated data exfiltration tools. Dark Pink splits functionalities and loads implants from memory to evade detection. They utilize spear-phishing emails, DLL side-loading, and private GitHub […]
Widespread exploitation of a critical command injection vulnerability (CVE-2023-28771) in Zyxel networking devices has been observed, with hackers using it to install malware. The flaw exists in the default configuration of affected firewall and VPN devices, allowing unauthenticated remote code execution through a specially crafted IKEv2 packet to UDP port 500. Zyxel has released patches […]
A threat actor known as Spyboy is promoting a tool called “Terminator” on a Russian hacking forum, claiming it can bypass and terminate various antivirus and security solutions on Windows systems. However, cybersecurity firm CrowdStrike believes it’s a sophisticated Bring Your Own Vulnerable Driver (BYOVD) attack. Terminator is sold for prices ranging from $300 to […]
The state-sponsored hacking group known as Gamaredon (also referred to as Armageddon or Shuckworm) from Russia has intensified its targeting of critical organizations in Ukraine’s military and security intelligence sectors. They have employed an updated toolkit and new infection techniques. Previously associated with the FSB, the Russian hackers had been observed using information-stealing malware against […]
Google is unveiling new updates to enhance multi-cloud networking with Cross-Cloud Interconnect and Private Service Connect improvements. With Cross-Cloud Interconnect, organizations can establish secure connections between Google Cloud and other public cloud platforms like AWS, Microsoft Azure, and Oracle Cloud Infrastructure. This enables running applications on multiple clouds, hosting SaaS in a multi-cloud environment, and […]
Adobe unveils Generative Fill in Photoshop, integrating Firefly AI capabilities into design workflows. This collaborative co-pilot feature allows users to easily add, extend, or remove content from images using text prompts. Generative Fill transforms workflows across Adobe platforms, marking a significant milestone for Creative Cloud. Firefly, Adobe’s family of generative AI models, generates professional-quality content […]