Viruses, trojans, software vulnerabilities, security issues

About 10 critical vulnerabilities discovered in Qualcomm mobile chipsAbout 10 critical vulnerabilities discovered in Qualcomm mobile chips

About 10 critical vulnerabilities discovered in Qualcomm mobile chips

Researchers from Google's Android Red Team have discovered more than nine vulnerabilities in Adreno GPU, Qualcomm's popular software used to…

8 months ago
Researcher demonstrates bypass of Microsoft Copilot protectionResearcher demonstrates bypass of Microsoft Copilot protection

Researcher demonstrates bypass of Microsoft Copilot protection

At the Black Hat USA conference, cybersecurity researcher Michael Bargury demonstrated the vulnerabilities of Microsoft's artificial intelligence assistant Copilot -…

9 months ago
Microsoft accuses Iranian hackers of cyberattacks on US officialsMicrosoft accuses Iranian hackers of cyberattacks on US officials

Microsoft accuses Iranian hackers of cyberattacks on US officials

Microsoft cybersecurity experts said Iranian government-linked hackers tried to hack the account of a senior U.S. official in June and…

9 months ago
Hackers can roll back Windows to an older version to exploit known vulnerabilitiesHackers can roll back Windows to an older version to exploit known vulnerabilities

Hackers can roll back Windows to an older version to exploit known vulnerabilities

Security researcher Alon Levie of SafeBreach has discovered two vulnerabilities in Windows Update. Their exploitation allows you to downgrade the…

9 months ago
An 18-year-old vulnerability has been discovered in Chrome, Firefox and Safari browsers – they incorrectly process the address 0.0.0.0An 18-year-old vulnerability has been discovered in Chrome, Firefox and Safari browsers – they incorrectly process the address 0.0.0.0

An 18-year-old vulnerability has been discovered in Chrome, Firefox and Safari browsers – they incorrectly process the address 0.0.0.0

Google Chrome, Apple Safari, and Mozilla Firefox browsers do not correctly handle requests to IP address 0.0.0.0, directing requests to…

9 months ago
Hackers have learned how to massively and quietly distribute malware through hacking Internet providersHackers have learned how to massively and quietly distribute malware through hacking Internet providers

Hackers have learned how to massively and quietly distribute malware through hacking Internet providers

The Chinese hacker group StormBamboo, aka Evasive Panda, hacked an Internet provider and began infecting the computers of its subscribers…

9 months ago
Microsoft fixed global outage after massive cyberattack on July 30Microsoft fixed global outage after massive cyberattack on July 30

Microsoft fixed global outage after massive cyberattack on July 30

Microsoft has announced that it has fixed a large-scale outage that affected many popular services, including the Outlook email client…

9 months ago
Google Play is hit by a third Mandrake malware invasion – they’ve been hiding in plain sight for yearsGoogle Play is hit by a third Mandrake malware invasion – they’ve been hiding in plain sight for years

Google Play is hit by a third Mandrake malware invasion – they’ve been hiding in plain sight for years

An infestation of applications with built-in Mandrake spyware was discovered in the Google Play Store, Kaspersky Lab reported. This is…

9 months ago
In the USA, they created a risk assessment system for AI algorithmsIn the USA, they created a risk assessment system for AI algorithms

In the USA, they created a risk assessment system for AI algorithms

The National Institute of Standards and Technology (NIST), part of the U.S. Department of Commerce, which develops and tests technologies…

9 months ago
Researchers have taught AI to steal information from a monitor using radiation from an HDMI cableResearchers have taught AI to steal information from a monitor using radiation from an HDMI cable

Researchers have taught AI to steal information from a monitor using radiation from an HDMI cable

A new study has found that hackers can use artificial intelligence to decipher electromagnetic radiation emanating from the cable that…

9 months ago