Tor Browser 14.0.8: Urgent Windows Release
The Tor Project has quickly released an emergency update, Tor Browser 14.0.8, available only for Windows users. It can be downloaded from the Tor Browser download page and the Tor [...]
Detecting Deep Learning Backdoors: The DeBackdoor Approach
Researchers from Qatar Computing Research Institute and Mohamed bin Zayed University developed DeBackdoor, a framework to detect hidden backdoor attacks in deep learning models used in critical systems like self-driving [...]
SHELBY malware: GitHub C2, data theft
Elastic Security Labs has discovered a complex malware campaign, REF8685, targeting Iraq's telecom sector. The campaign uses a new malware family, SHELBY, which exploits GitHub for command-and-control (C2), data exfiltration, [...]
Fake Snow White downloads spread malware to viewers
With no official streaming release for the new Snow White, many users are resorting to piracy, making them vulnerable to cyber threats. Veriti researchers uncovered a campaign where attackers distribute [...]
46 flaws: solar inverters open to attack
Forescout Vedere Labs found 46 vulnerabilities in solar inverters from Sungrow, Growatt, and SMA. Exploiting these flaws could disrupt power grids and compromise user privacy. Over 80% of solar vulnerabilities [...]