-
"Hacktivists Claim Leak Over 1 Terabyte of Disney Data"
A hacktivist group recently claimed to have stolen and leaked over a terabyte of data from Diseny's internal slack channels.
-
"3 API Security Risks and Recommendations for Mitigation"
Reconnaissance is one of the most time-consuming parts of network attack planning for adversaries.
-
"NSA's Final Zero Trust Pillar Report Outlines How to Achieve Faster Threat Response Time"
The National Security Agency (NSA) has released a new Cybersecurity Information Sheet (CSI) titled "Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar" to help organizations detect cyber threats and respond to threats more
-
"New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection"
Researchers have discovered a new ransomware strain called "HardBit" that uses new obfuscation methods to avoid analysis. Cybereason researchers found that HardBit ransomware 4.0 added passphrase protection.
-
"Microsoft Says Windows Not Impacted by regreSSHion as Second OpenSSH Bug Is Found"
A second Remote Code Execution (RCE) vulnerability has been found in OpenSSH in an analysis of the recently discovered "regreSSHion" flaw. The regreSSHion bug, discovered by Qualys, was believed to impact millions of OpenSSH servers.
-
"Attackers Exploit URL Protections to Disguise Phishing Links"
Barracuda researchers found cybercriminals using URL protection services to hide phishing links. The company observed phishing campaigns using three URL protection services to mask phishing URLs and send victims to credential-stealing websites.
-
"Hackers Beware: Research Shows AI Can Assist With Cybersecurity"
According to a recent paper by University of Missouri researcher Prasad Calyam and collaborators from Amrita University in India, Artificial Intelligence (AI)-powered chatbots can pass a cybersecurity exam but should not be relied on for complete
-
"A Simple Firmware Update Completely Hides a Device's Bluetooth Fingerprint"
A smartphone's unique Bluetooth fingerprint could be used to track the device's user. To eliminate this vulnerability, a team of researchers at UC San Diego has developed a simple firmware update that completely hides the Bluetooth fingerprint.
-
"New Blast-RADIUS Attack Breaks 30-Year-Old Protocol Used in Networks Everywhere"
One of the most widely used network protocols, Remote Authentication Dial-In User Service (RADIUS), is vulnerable to a newly discovered attack called "Blast-RADIUS." This complex attack enables adversaries to gain control over various environments, inc
-
"NIST Will Fire the 'Starting Gun' in the Race to Quantum Encryption"
ML-KEM, CRYSTALS-Dilithium, and Sphinx Plus are three standardized post-quantum algorithms that will allow classical computers to encrypt data against a future fault-tolerant quantum computer.
-
"Akira Ransomware: Lightning-Fast Data Exfiltration in 2-ish Hours"
According to the BlackBerry Threat Research and Intelligence Team, "Akira" ransomware actors can now exfiltrate data from victims in just over two hours, a significant change in the average time it takes a cybercriminal to get to the stage where they c
-
"Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments"
The Exim mail transfer agent has a critical security flaw that could allow threat actors to send malicious attachments to target users' inboxes. Exim is a free mail transfer agent used in hosts running Unix or Unix-like operating systems.
News