Month: May 2024

May 21, 2024NewsroomSupply Chain Security / AI Model A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by threat actors to achieve arbitrary code execution. Tracked as CVE-2024-34359 (CVSS score: 9.7), the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx. “If exploited, it
0 Comments
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT, and XWorm. “This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands,” Check Point said in a technical report. “This exploit
0 Comments
ROME, ITALY – NOVEMBER 10: Actress Scarlett Johansson attends ‘Her’ Premiere during The 8th Rome Film Festival at Auditorium Parco Della Musica on November 10, 2013 in Rome, Italy. (Photo by Vittorio Zunino Celotto/Getty Images) Vittorio Zunino Celotto | Getty Images Entertainment | Getty Images Actress Scarlett Johansson says OpenAI CEO Sam Altman used a
0 Comments
May 20, 2024NewsroomCyber Attack / Threat Intelligence An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind destructive wiping attacks targeting Albania and Israel under the personas Homeland Justice and Karma, respectively. Cybersecurity firm Check Point is tracking the activity under the moniker Void Manticore, which is
0 Comments
The Redmi Buds 5A were unveiled in India alongside the Redmi Pad SE in April this year at Xiaomi’s ‘Smarter Living & More’ launch event. The audio wearable comes with active noise cancellation (ANC) and Google Fast Pair support, as well as an IPX4 rating and a companion app. These true wireless earphones (TWS) are
0 Comments
May 20, 2024NewsroomMalvertising / Cryptocurrency A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro. “The presence of multiple malware
0 Comments