ZenHammer Attack Gets Around AMD CPUs’ Rowhammer Defenses
March 28, 2024
For the first time, ETH Zurich cybersecurity researchers have created a new version of the RowHammer DRAM (dynamic random-access memory) ZenHammer Attack that is effective against AMD Zen 2 and Zen 3…
0 Comments6 Minutes
Microsoft SharePoint Vulnerability Under Attack by Hackers
March 27, 2024
The United States Cybersecurity and Infrastructure Security Agency (CISA) has recently flagged a critical security flaw impacting the Microsoft SharePoint Server, escalating it to the Known Exploited…
0 Comments4 Minutes
The Role of a Cybersecurity Specialist
March 27, 2024
A cybersecurity specialist is tasked with the ongoing responsibility of identifying, monitoring, and countering cyber threats. These professionals are not just observers; they actively design,…
0 Comments8 Minutes
CISA Alerts: Flaws in Fortinet, Ivanti, & Nice Products Exploited
March 26, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently expanded its Known Exploited Vulnerabilities (KEV) list, highlighting three critical security flaws. This update comes with a…
0 Comments4 Minutes
Apple M-Series Chips’ New “GoFetch” Vulnerability Exposes Secret Encryption Keys
March 25, 2024
The vulnerability, dubbed GoFetch, is related to a microarchitectural side-channel attack that targets constant-time cryptographic implementations and retrieves sensitive data from the CPU cache by…
0 Comments7 Minutes
Cybersecurity guide for small businesses in Canada.
March 22, 2024
As the digital landscape evolves, so too do the cybersecurity threats that target our information systems. For businesses, especially in the tech-centric world we now inhabit, staying ahead of these…
0 Comments20 Minutes
DNS over HTTPS Gives Users a “False Sense of Security”
March 21, 2024
Businesses that use encrypted DNS over HTTPS services run the risk of creating a false feeling of security and possibly even breaking their own DNS-monitoring systems, according to a warning from the…
0 Comments3 Minutes
Loop DoS attack has effect on thousands of different systems.
March 20, 2024
There is a new denial-of-service (Loop DoS attack) vector that has been discovered. This attack vector targets application-layer protocols that are based on User Datagram Protocol (UDP), which puts…
0 Comments5 Minutes
Alert: Ravaging AcidPour Malware Strikes Linux x86 Devices
March 19, 2024
It has been discovered that a new variation of a data-erasing malware, known as AcidPour Malware, has been discovered in the wild. This particular variant is meant to particularly target Linux x86…
0 Comments3 Minutes
ChatGPT Plugins from Third Parties May Cause Account Takeovers
March 18, 2024
According to cybersecurity researchers, threat actors attempting to obtain unauthorized access to sensitive data may use third-party plugins for OpenAI ChatGPT as a new avenue of attack. New study…
0 Comments7 Minutes