News
-
"CISA Releases New Resource to Help Small and Medium-Sized Businesses Develop Supply Chain Resilience Plans"The US Cybersecurity and Infrastructure Security Agency (CISA) has released a new resource guide titled "Empowering Small and Medium-Sized Businesses (SMB): A Resource Guide for Developing a Resilient Supply Chain Risk Management Plan." It aims to help
-
"The SEC's Cybersecurity Rules"The US Securities and Exchange Commission (SEC) has recently adopted rules requiring public companies to disclose cybersecurity incidents within four business days.
-
"Quasar RAT Leverages DLL Side-Loading to Fly Under the Radar"Quasar RAT, also known as CinaRAT or Yggdrasil, is an open-source Remote Access Trojan (RAT) that has been using DLL side-loading to avoid detection and stealthily steal data from compromised Windows hosts.
-
"US Energy Firm Shares How Akira Ransomware Hacked Its Systems"The US energy services company BHI Energy has detailed how the Akira ransomware operation breached its network and stole data.
-
"FBI: Thousands of Remote IT Workers Sent Wages to North Korea to Help Fund Weapons Program"The FBI and Department of Justice (DoJ) have recently announced that thousands of information technology workers contracting with U.S.
-
"Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover"Eight recently discovered vulnerabilities in the SolarWinds Access Rights Manager Tool (ARM), including three of critical severity, could allow attackers to gain access to unpatched systems with the highest levels of privilege.
-
"'Disappearing' Implants, Followed by First Fixes for Exploited Cisco IOS XE Zero-Day"Cisco has released the first fixes for the IOS XE zero-day vulnerability, tracked as CVE-2023-20198, which attackers exploited to deliver a malicious implant.
-
"Low-Power Hardware Accelerator Offers Outsize Security"A research team in the US has developed a novel hardware accelerator prototype for edge devices that can encrypt cloud-sent and -received messages with 1,000 to 6,000 times the energy efficiency of a standard RISC-V processor.
-
"Okta Breached Via Stolen Credential"Identity and access management (IAM) specialist Okta has recently found itself on the receiving end of another security breach after a threat actor was able to access a stolen credential.
-
"Your Browser Extension Could Grab Your Password and Sensitive Info"A team of digital security researchers at the University of Wisconsin-Madison discovered that some widely used websites are vulnerable to browser extensions capable of extracting sensitive information from HTML code, including passwords, credit card nu
-
"ICC: September Breach Was Espionage Raid"The International Criminal Court (ICC) has recently revealed that a September cyberattack on its IT systems was a highly targeted espionage attempt, although attribution thus far remains elusive.
-
"Cybersecurity: IMC2 Researchers Mobilize to Counter Insider Threats"Polytechnique Montréal has announced a cybersecurity project to prevent insider threats.