Algorithms Are Coming for Democracy—but It’s Not All Bad
In 2025, AI is poised to change every aspect of democratic politics—but it won’t necessarily be for the worse. India’s prime minister, Narendra Modi, has...
North Korean hackers masquerade as remote IT workers and venture capitalists to steal crypto and secrets
In itslust for stealing cryptocurrency and sensitive information, North Korean hackers are disguising themselves as remote IT workers, recruiters, and even venture capitalists. Read more...
No guarantees of payday for ransomware gang that claims to have hacked children’s hospital
What is the point of INC Ransom's attack on Alder Hey? They are not likely to be paid, and the attack on a children's hospital...
Hydra Market Leader Sentenced to Life by Moscow Court
The “organizer” of notorious dark web drugs marketplace Hydra Market has been handed a life sentence in Russia Read More
Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank
The Foundation for Defense of Democracies has warned that Chinese-made LIDAR sensors could be weaponized for espionage Read More
Microsoft Warbird and PMP security research – technical doc
Posted by Security Explorations on Dec 03 Hello All, We have released a technical document pertaining to our Warbird / PMP security research. It is...
UK Cyber-Attacks Surge as Threats Hit Harder, Warns NCSC
In 2024, the UK National Cyber Security Centre issued over 500 notifications to UK organizations about cyber incidents – double the number recorded in 2023...
Best Ways to Reduce Your Digital Footprint Now
Every activity you perform online, whether it is commenting on a news article, sharing something on social media or your shopping preferences leaves a digital...
ZDI-24-1642: Linux Kernel nftables Type Confusion Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute...
ZDI-24-1641: Intel Computing Improvement Program PyInstaller Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Intel Computing Improvement Program. An attacker must first obtain the ability to execute...
