Latest news

Alert: beware of deceptive WinRar impersonation website
Phishing

Alert: beware of deceptive WinRar impersonation website

7 August 2024 dark6

SonicWall has issued a critical cybersecurity alert regarding a fraudulent website, win-rar.co, which closely imitates the legitimate WinRar site (win-rar.com)....
NVIDIA’s controversial use of copyrighted content for AI training
AI

NVIDIA’s controversial use of copyrighted content for AI training

7 August 2024 dark6

Recent internal communications revealed that NVIDIA has utilized videos from platforms such as YouTube and Netflix to train its AI...
Apple enhances privacy with new macOS Sequoia security strategy
Privacy

Apple enhances privacy with new macOS Sequoia security strategy

7 August 2024 dark6

Apple is taking significant strides in its commitment to privacy and security with the upcoming macOS Sequoia release. A notable...
Urgent security update: vulnerabilities addressed in Apache Linkis
Vulnerability

Urgent security update: vulnerabilities addressed in Apache Linkis

6 August 2024 dark6

Apache Linkis, a vital middleware for connecting applications to various data processing engines, has recently patched two significant security vulnerabilities...
BlankBot: a rising threat in Android banking trojans
Malware

BlankBot: a rising threat in Android banking trojans

6 August 2024 dark6

A new Android banking trojan, identified as “BlankBot,” has emerged as a critical threat for mobile users, particularly targeting those...
The evolving landscape of Proton ransomware: a focus on the Zola variant
Ransomware

The evolving landscape of Proton ransomware: a focus on the Zola variant

6 August 2024 dark6

Since its emergence in March 2023, the Proton ransomware family has shown a remarkable capacity for evolution, with the latest...
Mint Stealer: a deep dive into Malware-as-a-Service
Malware

Mint Stealer: a deep dive into Malware-as-a-Service

5 August 2024 dark6

Cyfirma’s recent report has shed light on Mint Stealer, a sophisticated malware operating within the Malware-as-a-Service (MaaS) framework. This advanced...
End of Life for Linux Kernel 6.9: time to upgrade
Vulnerability

End of Life for Linux Kernel 6.9: time to upgrade

5 August 2024 dark6

As of May 2024, the Linux Kernel 6.9 series has officially reached its end of life (EOL) with the release...
Evasive Panda’s infiltration of ISP systems
Cybercrime

Evasive Panda’s infiltration of ISP systems

5 August 2024 dark6

In mid-2023, a security report from Volexity unveiled a significant cyber espionage campaign orchestrated by the Chinese hacking group known...
The rise and fall of Cryptonator: a cautionary tale of unlicensed cryptocurrency exchanges
Cybercrime

The rise and fall of Cryptonator: a cautionary tale of unlicensed cryptocurrency exchanges

5 August 2024 dark6

The U.S. Department of Justice (DOJ) has officially charged Roman Pikulev with the creation and operation of Cryptonator, an unlicensed...
Understanding the “Sitting Ducks” attack: a growing threat to domain security
Cybercrime

Understanding the “Sitting Ducks” attack: a growing threat to domain security

4 August 2024 dark6

Recent research highlights a critical vulnerability in domain security, termed the “Sitting Ducks” attack, which has enabled cybercriminals to seize...
Twilio discontinues Authy desktop service amidst investor pressures
Vulnerability

Twilio discontinues Authy desktop service amidst investor pressures

4 August 2024 dark6

Twilio has officially terminated its Authy desktop service, a move that will impact users who previously relied on the desktop...