chief security officer
-
Bandook RAT Variant Targets Windows System Security Attacks
A new variant of Bandook Remote Access Trojan (RAT) is spread through carefully designed phishing emails targeting Windows users. The new variant utilizes a link embedded in a disguised PDF file to induce users to download and decompress a .7z compressed file containing malware, which is then injected into the msinfo32.exe system file to manipulate computers and steal information behind the scenes.
-
Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset
The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.
-
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Google agreed to pay $5 billion to settle a privacy lawsuit alleging that the company tracked users in incognito mode. The lawsuit accused Google of using tools such as Google Analytics to collect data on users even when they thought they were browsing privately.
-
How the next generation of Wi-Fi7 will change our world
The next generation of Wi-Fi 7 is focused on improving reliability, reducing latency and increasing throughput. These improvements will have a significant impact on our world, including:
Improve the quality of virtual reality and augmented reality experiences.The higher speed and reliability of Wi-Fi 7 will make virtual reality and augmented reality experiences smoother and more immersive. This will open up new possibilities in areas such as gaming, entertainment and education. Driving the popularity of telecommuting and learning.The lower latency of Wi-Fi 7 will make telecommuting and learning smoother and more efficient. This will provide greater flexibility and help organizations save money. Accelerate the growth of the Internet of Things.The higher throughput of Wi-Fi 7 will enable IoT devices to transmit more data, thus improving their functionality and efficiency. This will open up new opportunities for growth in areas such as smart cities, smart homes and Industry 4.0. -
Artificial Intelligence Technology Predictions: 2024 Outlook
The year 2024 will be filled with important events and developments in the world of artificial intelligence. Futures expert Daniel Burrus offers a way to predict the future of AI, categorizing trends into "hard" and "hard" trends. And "soft". "Solid trends...
-
Artificial Intelligence Supercomputer JUPITER Coming Soon
The performance of a billion billion floating point operations will change science and technology forever. It could become the world's fastest and most powerful machine, helping to realize many breakthroughs in every field of science, from climate change to quantum physics. The first 10 billion billion billion supercomputer JUPITER ...
-
Google Cloud Addresses Kubernetes Service Privilege Escalation Vulnerability
Google Cloud has addressed a criticality security vulnerability in its platform that can be exploited by attackers to escalate privileges in Kubernetes clusters they already have access to. The company said in an announcement on December 14, 2023...
-
SecuSphere: Open Source One-Stop Solution for DevSecOps
SecuSphere is a comprehensive DevSecOps platform designed to simplify and enhance your organization's security posture throughout the software development lifecycle. Our platform is the central hub for vulnerability management, security assessments, CI/CD pipeline integration, and fostering DevSecOps practices and culture.
-
Malicious WordPress plugin puts e-commerce sites at risk of credit card theft
WordPress plugin security researchers have discovered a malicious WordPress plugin capable of creating fake administrator accounts and injecting malicious JavaScript code used to steal credit card information. According to cybersecurity companies…
-
Iran's cyber espionage "muddy waters" are back, and the Middle East telecommunications industry has become a new hunting ground
The Iranian state-level cyber espionage organization "MuddyWater" has resurfaced and used a new command and control framework called "MuddyC2Go" to launch attacks targeting the telecommunications industries of Egypt, Sudan and Tanzania. Symantec Threat Hunter Team…