Patent troll Sable pays up, dedicates all its patents to the public!
Back in February, we celebrated our victory at trial in the U.S. District Court for the Western District...
DrayTek fixed critical flaws in over 700,000 exposed routers
DrayTek has released security updates for multiple router models to address 14 vulnerabilities of varying severity, including a...
Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by...
How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
Since early September, Cloudflare’s DDoS protection systems have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks....
Accelerating LLMs with llama.cpp on NVIDIA RTX Systems
The NVIDIA RTX AI for Windows PCs platform offers a thriving ecosystem of thousands of open-source models for...
Microsoft blocks Windows 11 24H2 on some Intel PCs over BSOD issues
Microsoft is blocking Windows 24H2 upgrades on systems with incompatible Intel Smart Sound Technology (SST) audio drivers due...
Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit
Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious...
Biden-Harris Administration to Invest up to $100 Million to Accelerate R&D and AI Technologies for Sustainable Semiconductor Materials
Today, the U.S. Department of Commerce issued a Notice of Intent (NOI) to announce an open competition demonstrating...
Microsoft warns of Windows 11 24H2 gaming performance issues
Microsoft is working to fix several known issues behind Asphalt 8 game crashes and Easy Anti-Cheat blue screens...
5 Must-Have Tools for Effective Dynamic Malware Analysis
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a...
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research
Introduction In the ever-evolving landscape of cybersecurity, logs, that is information collected from various sources like network devices,...
Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat actor...
Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw
Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor’s Zimbra Collaboration....
PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data
A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded...
Arc browser launches bug bounty program after fixing RCE bug
The Browser Company has introduced an Arc Bug Bounty Program to encourage security researchers to report vulnerabilities to...
New VMware Strategic Partner Incentive (SPI) for Managed Services in AWS Partner Central
Today, Amazon Web Services, Inc. (AWS) announces a new VMware SPI for Managed Services as part of Migration...
Amazon Redshift launches RA3.large instances
Amazon Redshift launches RA3.large, a new smaller size in the RA3 node type with 2 vCPU and 16...
Microsoft fixes Outlook email sending issue for users with many folders
Microsoft has fixed a known issue affecting Outlook for Microsoft 365 users that caused problems sending emails for...
AWS announces Reserved Nodes flexibility for Amazon ElastiCache
Today we’re announcing enhancements to Amazon ElastiCache Reserved Nodes that make them flexible and easier to use, helping...
Rackspace monitoring data stolen in ScienceLogic zero-day attack
Cloud hosting provider Rackspace suffered a data breach exposing “limited” customer monitoring data after threat actors exploited a...