Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such as the Americas, Europe, Africa, and the Asia-Pacific area. According to findings from Mandiant researchers, there are four continuous campaigns aimed at susceptible Citrix NetScaler ADC and Gateway devices, with these attacks having...Read More
A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four years without attracting attention due to their discreet operations. Within just a month, Prolific Puma has managed to create numerous domains, including many within the U.S. top-level domain (usTLD), to facilitate the distribution...Read More
Google has implemented a substantial improvement in Chrome’s online security by automatically converting insecure HTTP requests into HTTPS requests for all users. This functionality, known as HTTPS-Upgrades, aims to enhance the security of older links that originally used HTTP by initially trying to establish a connection via the encrypted HTTPS protocol. While a limited introduction...Read More
Meta has introduced a revolutionary AI system that can rapidly interpret visual information from the human brain. This system records thousands of measurements of brain activity each second and reconstructs the way our minds perceive and analyze images. The research paper describes these findings as a significant advancement in the real-time decoding of the ongoing...Read More
Mobile devices have significantly boosted our contemporary lifestyles, enabling us to perform a wide range of tasks, including in-store purchases, online bill payments, and the secure storage of financial information, health records, passwords, and images. Data.ai reports that the pandemic expedited the growth of established mobile practices, such as a 25% annual increase in finance-related...Read More
Security experts have discovered that a significant number of IT administrators are employing tens of thousands of easily guessable passwords to safeguard their portal access, which exposes enterprise networks to potential cyberattacks. Among the over 1.8 million administrator credentials examined, more than 40,000 of them were simply “admin,” indicating a widespread preference for the default...Read More
AI tools play a significant role in simplifying the responsibilities of Data Analysts within the realm of data science. These technologies streamline the process of effectively analyzing data and extracting valuable insights from vast databases. Among the five AI tools that prove beneficial for data analysis are powerful open-source machine learning software libraries such as...Read More
Congratulations Prof. Ir. Tole Sutikno, S.T., M.T., Ph.D., IPM., ASEAN Eng. For achieving the highest academic position as Professor, in the field of Power Electronics and Electrical Motor Drives.Read More
Geoffrey Hinton, frequently referred to as one of the prominent figures in the field of AI, has become notably vocal following his retirement from Google earlier this year. He is renowned for his role in refining and promoting “backpropagation,” a crucial algorithm that allows multi-layer neural networks to learn from and rectify their errors. This...Read More
Between July and September, DarkGate malware assaults have leveraged hacked Skype accounts to contaminate intended victims via messages containing VBA loader script attachments. According to Trend Micro security researchers, who identified these attacks, this script is responsible for fetching a second-stage AutoIT script, which is tailored to deposit and run the final DarkGate malware payload....Read More