Headlines
Rivalstvo med hekanjem: Boj za dokazovanje talenta v svetu kibernetske varnosti.

Rivalstvo med hekanjem: Boj za dokazovanje talenta v svetu kibernetske varnosti.

Nova rivaliteta je vzbudila pozornost strokovnjakov in navdušencev za kibernetsko varnost. Soočenje med dvema zloglasnima hekerskima skupinama, CyberVolk in DoubleFace, je eskaliralo v javni spektakel. CyberVolk je izzval DoubleFace, naj dokaže svoje hekerske sposobnosti. Ta razvoj dogodkov poudarja nenehno tekmovanje med hekerji za demonstracijo svojih veščin in vzpostavitev prevlade v kibernetskem svetu. Drzni Izziv CyberVolk…

Read More
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

Understanding the Rhadamanthys Information Stealer Rhadamanthys is a powerful information stealer that has recently evolved to include new advanced features. The threat actors behind it have made significant upgrades, notably incorporating artificial intelligence (AI) for optical character recognition (OCR). This new feature, known as "Seed Phrase Image Recognition," allows Rhadamanthys to extract cryptocurrency wallet seed…

Read More
5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

The Rise of Generative AI in Business Generative AI has transformed the way enterprises operate. By streamlining tasks such as software development, financial analysis, and customer engagement, these tools significantly enhance productivity. However, this leap in efficiency raises serious concerns about data security. Businesses must tread carefully to avoid sensitive data leakage while harnessing the…

Read More

Zaščita prihodnosti: Kako BloxOne® Threat Defense ščiti IoT naprave pred kibernetskimi grožnjami

Internet stvari (IoT) je hitro rastoče področje, ki prinaša številne priložnosti, a tudi izzive na področju kibernetske varnosti. IoT naprave so pogosto ranljive in lahka tarča za napadalce, saj imajo omejene zmogljivosti za varnost in pogosto uporabljajo privzeta gesla ali imajo zastarele programske opreme. BloxOne® Threat Defense je rešitev, ki pomaga zaščititi IoT naprave in…

Read More
IDA 9.0 Izdan: Vznemirljive Nove Funkcije pri Reverse Inženiringu. Cyber Security, Reverse Engineering, in Threat Attacks.

IDA 9.0 Izdan: Vznemirljive Nove Funkcije pri Reverse Inženiringu. Cyber Security, Reverse Engineering, in Threat Attacks.

## Pomembne spremembe pri licenciranju IDA in njihova vez na kibernetsko varnost Licenciranje IDA je doživelo pomembne spremembe, ki vplivajo na njegovo uporabo v kontekstu kibernetske varnosti in razsestavljanja. Licenciranje je sedaj neodvisno od platforme, kar omogoča uporabo na **Windows**, **Linux** in **macOS**. Na voljo so različni paketi razsestavljalnikov, vključno z novim **IDA Home RISCV**,…

Read More
THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 23-29)

THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 23-29)

Cybersecurity News: Recent Developments and Insights Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week, the discovery of vulnerabilities in CUPS (Common UNIX Printing System) could've opened the door to remote attacks. Additionally, Google's switch to Rust is paying off big time, significantly reducing memory-related vulnerabilities in Android. However,…

Read More
Session Hijacking 2.0: The Latest Method for Attackers to Bypass MFA

Session Hijacking 2.0: The Latest Method for Attackers to Bypass MFA

Understanding Session Hijacking: A Growing Threat In today’s digital landscape, attackers are increasingly turning to session hijacking as a way to bypass multi-factor authentication (MFA). This threat is gaining traction, evidenced by significant data trends in 2023. For instance, Microsoft detected 147,000 token replay attacks, marking a staggering 111% increase compared to the previous year….

Read More
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical Security Vulnerabilities in Automatic Tank Gauge Systems Recent reports have uncovered critical security vulnerabilities in six different Automatic Tank Gauge (ATG) systems from five manufacturers. These weaknesses could expose the systems to remote attacks by malicious individuals. The risks associated with these vulnerabilities are severe, possibly leading to physical damage, environmental hazards, and significant…

Read More