News
-
"Windows: New 'BatBadBut' Rust Vulnerability Given Highest Severity Score"A critical vulnerability, dubbed "BatBadBut," in the Rust standard library could be used to target Windows systems and launch command injection attacks.
-
"Researchers Resurrect Spectre v2 Attack Against Intel CPUs"Cybersecurity researchers at VU Amsterdam University have highlighted a new variation of the Spectre v2 attack that is aimed at Intel processors.
-
"CISA Announces Malware Next-Gen Analysis"The US Cybersecurity and Infrastructure Security Agency (CISA) has announced a new release of its malware analysis system, "Malware Next-Gen." The system welcomes any organization to submit malware samples and other suspicious artifacts for analy
-
"NSA Issues Guidance for Maturing Data Security"The National Security Agency (NSA) has published guidance on improving data security and protecting access to data at rest and in transit.
-
"Two New Bugs Can Bypass Detection and Steal SharePoint Data"Researchers have found two new Microsoft SharePoint flaws, posing a significant threat to businesses. These vulnerabilities could enable attackers to bypass audit logs, avoid triggering downloads, and exfiltrate SharePoint data.
-
"How Can the Energy Sector Bolster Its Resilience to Ransomware Attacks?"Cyber threats to the energy sector have increased significantly as geopolitical tensions continue to drive state-sponsored cyber espionage.
-
"Microsoft Plugs Gaping Hole in Azure Kubernetes Service Confidential Containers"Microsoft warns about a vulnerability that allows hackers to take complete control of Azure Kubernetes clusters.
-
"Researchers Discover New Ransomware Gang 'Muliaka' Attacking Russian Businesses"A ransomware gang, dubbed "Muliaka" by the Moscow-based cybersecurity company F.A.C.C.T., has been targeting Russian businesses with malware developed from the Conti hacking group's leaked source code.
-
"Home Depot Hammered by Supply Chain Data Breach"A hacking forum leak recently has led Home Depot to confirm that its employee data was compromised via a third-party software vendor.
-
"Hackers Use Malware to Hunt Software Vulnerabilities"Many threat actors are using malware to scan software vulnerabilities that they can exploit in future cyberattacks.
-
"Vietnamese Cybercrime Group CoralRaider Nets Financial Data"A new Vietnam-connected cybercrime group called "CoralRaider" has targeted individuals and organizations in Asia, stealing social media account information and user data.