Author Archives: [email protected]

Backdoor found in two healthcare patient monitors, linked to IP in China

The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. […]

Better text contrast for all Chromium-based browsers on Windows

In today’s digital age, browser users spend significant time reading content online. The contrast ratio between the text and its background is therefore very important to ensure comfort and to reduce eye strain. That’s why, based on your feedback, we had already enhanced text rendering in Microsoft Edge back in 2021. Today, we’re taking things […]

Infrastructure Laundering: Blending in with the Cloud

Image: Shutterstock, ArtHead. In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such outfit — a sprawling network tied to Chinese organized crime gangs and […]

Avowed: PC favorite engages players with freedom of choices

In Avowed, the immersive fantasy role-playing game from Obsidian launching on Feb. 18, players have more freedom than ever before in quests, character interactions and combat. Xbox Wire’s Mike Nelson spoke with the team behind the title to explore the philosophy behind that level of agency. “Everywhere I looked was an opportunity to engage with […]

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. “Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities,” Google Threat

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.