Viruses, trojans, software vulnerabilities, security issues

Researcher demonstrates bypass of Microsoft Copilot protection

At the Black Hat USA conference, cybersecurity researcher Michael Bargury demonstrated the vulnerabilities of Microsoft's artificial intelligence assistant Copilot -…

5 months ago

Microsoft accuses Iranian hackers of cyberattacks on US officials

Microsoft cybersecurity experts said Iranian government-linked hackers tried to hack the account of a senior U.S. official in June and…

5 months ago

Hackers can roll back Windows to an older version to exploit known vulnerabilities

Security researcher Alon Levie of SafeBreach has discovered two vulnerabilities in Windows Update. Their exploitation allows you to downgrade the…

5 months ago

An 18-year-old vulnerability has been discovered in Chrome, Firefox and Safari browsers – they incorrectly process the address 0.0.0.0

Google Chrome, Apple Safari, and Mozilla Firefox browsers do not correctly handle requests to IP address 0.0.0.0, directing requests to…

5 months ago

Hackers have learned how to massively and quietly distribute malware through hacking Internet providers

The Chinese hacker group StormBamboo, aka Evasive Panda, hacked an Internet provider and began infecting the computers of its subscribers…

6 months ago

Microsoft fixed global outage after massive cyberattack on July 30

Microsoft has announced that it has fixed a large-scale outage that affected many popular services, including the Outlook email client…

6 months ago

Google Play is hit by a third Mandrake malware invasion – they’ve been hiding in plain sight for years

An infestation of applications with built-in Mandrake spyware was discovered in the Google Play Store, Kaspersky Lab reported. This is…

6 months ago

In the USA, they created a risk assessment system for AI algorithms

The National Institute of Standards and Technology (NIST), part of the U.S. Department of Commerce, which develops and tests technologies…

6 months ago

Researchers have taught AI to steal information from a monitor using radiation from an HDMI cable

A new study has found that hackers can use artificial intelligence to decipher electromagnetic radiation emanating from the cable that…

6 months ago

Secure Boot has been compromised on more than 200 PC models from major manufacturers, and this is just the beginning

Cybersecurity experts at Binarly have discovered that the Secure Boot protocol used in UEFI firmware has been compromised on more…

6 months ago