Adventures in IoT
  • Menu ▾
    • About
    • Hacking Trash
    • News
    • Resources
  • About
  • Hacking Trash
  • News
  • Resources

Hardware Hacking & Cybersecurity News

  • New Attack Technique Exploits Microsoft Management Console Files
  • How to Cut Costs with a Browser Security Platform
  • New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks
  • Wikileaks' Julian Assange Released from U.K. Prison, Heads to Australia
  • 4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree
  • Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
  • Google Introduces Project Naptime for AI-Powered Vulnerability Research
  • Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
  • Ease the Burden with AI-Driven Threat Intelligence Reporting
  • RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations
  • Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices
  • ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
  • Warning: New Adware Campaign Targets Meta Quest App Seekers
  • U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban
  • Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
  • Military-themed Email Scam Spreads Malware to Infect Pakistani Users
  • How to Use Tines's SOC Automation Capability Matrix
  • Oyster Backdoor Spreading via Trojanized Popular Software Downloads
  • SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately
  • U.S. Bans Kaspersky Software, Citing National Security Risks
  • Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
  • French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
  • Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
  • Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
  • New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
  • Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
  • Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
  • UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
  • New Case Study: Unmanaged GTM Tags Become a Security Nightmare
  • New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers
  • Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software
  • Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
  • Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM
  • Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
  • The Annual SaaS Security Report: 2025 CISO Plans and Priorities
  • New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
  • VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
  • Singapore Police Extradites Malaysians Linked to Android Malware Fraud
  • ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
  • China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
  • What is DevSecOps and Why is it Essential for Secure Software Delivery?
  • Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
  • NiceRAT Malware Targets South Korean Users via Cracked Software
  • U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
  • Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
  • Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks
  • Meta Pauses AI Training on EU User Data Amid Privacy Concerns
  • Google's Privacy Sandbox Accused of User Tracking by Austrian Non-Profit
  • Learn to Secure Petabyte-Scale Data in a Webinar with Industry Titans
  • Why Regulated Industries are Turning to Military-Grade Cyber Defenses
© v3rtigo 2024 :: Email