News
-
"Threat Actors Can Exfiltrate Data From Google Drive Without Leaving a Trace"According to Mitiga researchers, Google Workspace has a vulnerability that prevents the discovery of data exfiltration from Google Drive. Using 'Drive log events,' Google Workspace provides visibility into an organization's Google Drive resources,…
-
"Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers"Toyota has announced the discovery of yet another data breach. This time, two misconfigured cloud services were discovered to have leaked the personal information of 260,000 car owners over a seven-year period. This discovery was made after the car maker…
-
"Software Supply Chain Security Risks Are Here: Are We Equipped to Act Accordingly? Purdue Tandem Tackles Thorny Cybersecurity Issue"Two Purdue University researchers are working to combat the rising number of supply chain attacks, especially those targeting third-party software suppliers and vendors. Sabine Brunswicker, a professor of digital innovation and communication, is…
-
"Guardrails on AI Tools Like ChatGPT Needed to Protect Secrets, CISOs Say"Walmart, Amazon, and Microsoft have warned employees to avoid disclosing corporate secrets or proprietary code when using ChatGPT and other generative Artificial Intelligence (AI) tools. A recent CISO panel at CyberRisk Alliance's Identiverse conference…
-
"Hackers Hold City of Augusta Hostage in a Ransomware Attack"The BlackByte group has claimed responsibility for a ransomware attack against the city of Augusta in Georgia. The ransomware group posted 10GB of free sample data and claimed access to much more. Researchers discovered that the sample data contained…
-
"Colombian Government Targeted by Suspected Cyber Partisans"According to the threat intelligence analyst FalconFeedsio, SiegedSec, a hacktivist group, is attacking Colombian government websites. The threat actor analyst Dark Owl points out that SiegedSec is a hacktivist group that arose last February, around the…
-
"IDSA: Only 49% of Firms Invest in Identity Protection Before Incidents"Researchers at the Identity Defined Security Alliance (IDSA) found that only 49% of leadership teams proactively invest in identity protection solutions before a security incident. Just 29% take action to support and invest in identity and security…
-
"Chrome 114 Released With 18 Security Fixes"Google recently announced the release of Chrome 114 to the stable channel with a total of 18 security fixes inside, including 13 that resolve vulnerabilities reported by external researchers. Of the externally reported flaws, eight have a severity…
-
"'Hot Pixel' Attack Steals Data From Apple, Intel, Nvidia, and AMD Chips via Frequency, Power and Temperature Info"By monitoring chip temperature, power, and frequency during normal operation, a team of security researchers, with funding from the Defense Advanced Research Projects Agency (DARPA) and the US Air Force, was able to steal data from Arm CPUs from Apple…
-
"Dark Pink APT Group Expands Tooling and Targets"The scope of a cyberattack campaign from APT group Dark Pink is broader than researchers first thought, with researchers identifying five new victims. The group is linked to the Chinese state and was previously thought to only focus its efforts…
-
"WordPress Rushes Out Jetpack Patch to Millions"The software company behind the popular blogging platform WordPress is automatically updating over five million installations of its Jetpack plugin after a critical vulnerability was discovered in it. Automattic, which also counts Jetpack as one of…
-
"Many Gigabyte PC Models Affected by Major Supply Chain Issue"According to researchers at the supply chain security vendor Eclypsium, hundreds of models of Gigabyte PCs are impacted by a backdoor that poses supply chain risks. The researchers revealed that Eclypsium's platform recently detected backdoor-like…