Viruses, trojans, software vulnerabilities, security issues

An AI that can control a PC without a user was tricked into downloading and running a virus

In October, Anthropic introduced an artificial intelligence model, Claude Computer Use, which allows the Claude neural network to independently control…

1 month ago

Don’t insert unfamiliar memory cards into your laptop: how SD Express resurrected DMA attacks

Positive Technologies experts reported that attackers can use SD Express memory cards to directly access system memory and hack the…

1 month ago

Fraudsters began to hijack accounts using corrupted Microsoft Word files

Cybercriminals have come up with a new way to carry out phishing attacks by bypassing the security systems of potential…

2 months ago

The State Duma adopted a law on millions of fines for personal data leaks

The State Duma immediately adopted in the second and third readings a law providing for fines for leakage of personal…

2 months ago

Hackers have found a way to disable Avast antivirus using its own driver

Cybersecurity researchers at Trellix have discovered that hackers have found a new way to disable antivirus programs on target systems…

2 months ago

D-Link offered to eliminate the vulnerability of routers by purchasing a new device

D-Link has announced that several of its routers have a remote code execution vulnerability. The company is not going to…

2 months ago

AI helped Google identify 26 open source software vulnerabilities, including a twenty-year-old

Google has used artificial intelligence to identify 26 new vulnerabilities in open source projects, including a bug in OpenSSL that…

2 months ago

GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18

Documents have leaked online revealing the capabilities of the hacking tool GrayKey, used by US law enforcement agencies, capable of…

2 months ago

Apple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOS

Apple has released emergency security updates for macOS, iOS and iPadOS, eliminating two critical zero-day vulnerabilities that were actively exploited…

2 months ago

Windows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening again

After the devastating CrowdStrike outage in July this year, Microsoft promised to improve the situation, although it insisted that the…

2 months ago