Technology New Android malware steals your credit cards for NFC relay attacks Apr 19, 2025 bleepingcomputer.com A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale…
Technology Cisco Webex bug lets hackers gain code execution via meeting links Apr 18, 2025 bleepingcomputer.com Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution…
Technology EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcher Apr 7, 2025 bleepingcomputer.com EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities…
Lifestyle Transportation Rolls-Royce Phantom Cherry Blossom is a Rolling Celebration of Spring Apr 3, 2025 classiccars.com Back in March, in an article about Rolls-Royce expanding its Goodwood factory, I mentioned that...
Lifestyle Transportation Velocity Restorations Creates a Custom 1972 Ford F-150 Apr 2, 2025 classiccars.com At the airport, Customs translates to a lot of rules to follow. But in the...
Technology We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain Apr 1, 2025 bleepingcomputer.com A RAR file, a fake summons, and a Nietzsche quote—all part of a multi-stage malware chain delivering DCRat & Rhadamanthys.…
Technology Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks Mar 31, 2025 bleepingcomputer.com A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage…
Technology Hackers abuse WordPress MU-Plugins to hide malicious code Mar 31, 2025 bleepingcomputer.com Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.…
Lifestyle Transportation Interesting Finds: 1997 Lotus Esprit V8 Mar 31, 2025 classiccars.com A passion for automobiles is a powerful force. It drives people to do hours of...
Technology New Ubuntu Linux security bypasses require manual mitigations Mar 28, 2025 bleepingcomputer.com Three security bypasses have been discovered in Ubuntu Linux's unprivileged user namespace restrictions, which could be enable a local attacker…
New Android malware steals your credit cards for NFC relay attacks
A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale…
Cisco Webex bug lets hackers gain code execution via meeting links
Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution…
EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcher
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities…
Rolls-Royce Phantom Cherry Blossom is a Rolling Celebration of Spring
Back in March, in an article about Rolls-Royce expanding its Goodwood factory, I mentioned that...
Velocity Restorations Creates a Custom 1972 Ford F-150
At the airport, Customs translates to a lot of rules to follow. But in the...
We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
A RAR file, a fake summons, and a Nietzsche quote—all part of a multi-stage malware chain delivering DCRat & Rhadamanthys.…
Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks
A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage…
Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.…
Interesting Finds: 1997 Lotus Esprit V8
A passion for automobiles is a powerful force. It drives people to do hours of...
New Ubuntu Linux security bypasses require manual mitigations
Three security bypasses have been discovered in Ubuntu Linux's unprivileged user namespace restrictions, which could be enable a local attacker…