top of page
Image by NASA

News

Home   |   News

server-rack.jpeg

Security researchers found a new service called Dark Utilities that provides an easy inexpensive way for cybercriminals to set up a command and control (C2) center for their malicious operations.

encryption.jpeg

A late-stage candidate encryption algorithm that was meant to withstand decryption by powerful quantum computers in the future 

 has been trivially cracked...

kali-linux.jpeg

Offensive Security has released ​Kali Linux 2022.3, the third version of 2022, with virtual machine improvements, Linux Kernel 5.18.5, new tools to play with, and improved ARM support.

Apple-iPhone_edited.jpg

Security researchers are raising the alarm about mobile app developers relying on insecure practices that expose Amazon Web Services (AWS) credentials, making the supply chain vulnerable.

China_hacker_silhouette_edited.jpg

China-based threat actors have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing select individuals to a fake impersonating an Australian news...

image_edited.jpg

Newly discovered cyberspy crew targets Asian governments and corporations

A cyberespionage group has targeted government agencies and big-name corporations throughout Asia since at least 2020, using the notorious ProxyShell vulnerabilities in...

bottom of page