embedded
-
February 10, 2025
SHA256 Hash Calculation from Data Chunks
The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity. It processes input data…
Read More » -
February 10, 2025
Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows
A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat to IT administrators and developers worldwide.…
Read More » -
February 9, 2025
Hackers Leveraging Image & Video Attachments to Deliver Malware
Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like steganography and social engineering. These…
Read More » -
January 26, 2025
Server Configurations and TLS Certificates Revealed
In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a suspected Chinese state-backed cyber actor…
Read More » -
January 25, 2025
Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights
A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave vulnerability, potentially allowing attackers to…
Read More » -
January 21, 2025
PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887)
A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability in the TP-Link TL-WR940N router,…
Read More » -
January 9, 2025
New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks
A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to trick users into compromising their PayPal…
Read More » -
January 3, 2025
LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware
LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome extensions, which can manipulate emails, track…
Read More » -
January 1, 2025
New Botnet Exploiting D-Link Routers To Gain Control Remotely
Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which…
Read More » -
December 27, 2024
Lumma Stealer Attacking Users To Steal Login Credentials From Browsers
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed…
Read More »