The revenue from cryptocurrency scams for 2022 also decreased by 65% to $1.6 billion this year, from where it was through the end of…
General
Updates for iOS 15.6.1 and macOS 12.5.1 fix “actively exploited” flaws.
On Apple’s devices, arbitrary code execution is possible due to WebKit and kernel flaws. 18th amendment, 3:45 pm: In order to address the WebKit…
Hacking Actions That Are Legal Under UK Law Are Suggested By “Professional Consensus”
Campaigners argue that contentious edge case activities are not a justification for further delaying much overdue’ reform. While the government is now reviewing the…
Intel and AMD Processors Have ÆPIC and SQUIP Vulnerabilities
A team of researchers has disclosed information on a fresh flaw in Intel CPUs that lets attackers steal encryption keys and other sensitive data…
Systems Using RTLS Are Susceptible To MITM Attacks And Location Manipulation
Multiple UWB RTLS (real-time locating systems) vulnerabilities have been found by security researchers, giving threat actors the ability to conduct man-in-the-middle attacks and modify…
Update Zoom For Mac Right Away To Prevent The Root-Access Flaw
It’s time for a manual update if you use Zoom on a Mac. The most recent version to the video conferencing software closes a…
1,900 People Signal Phone Numbers Were Revealed By The Twilio Attack
Nearly 1,900 Signal users’ phone numbers were made public as a result of the data breach Twilio, a cloud communications provider, had at the…
Three Microsoft-Signed Boot Loaders Have UEFI Secure Boot Bypasses, According To Researchers.
Unsigned third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypassing of the UEFI Secure Boot feature have been found to have a…
GoTestWAF Expands API Attack Testing With Support For OpenAPI
Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to…
Hackers Exploited Crypto Platform RenBridge To Launder $540 mn: Reports
More than half a billion dollars have been laundered in crypto assets originating from theft, fraud, ransomware and various other types of criminal activity…