News
-
"Australian Gold Producer Evolution Mining Hit by Ransomware"Evolution Mining recently announced that it had been targeted by a ransomware attack on August 8, 2024, which impacted its IT systems. Evolution Mining is one of Australia's largest gold producers, and it also has a presence in Canada.
-
"DARPA Awards $14m to Seven Teams in AI Cyber Challenge"The AI Cyber Challenge (AIxCC), run by the Defense Advanced Research Projects Agency (DARPA), has officially awarded seven semifinalists $2m each at DEFCON 32 where the agency hosted an immersive experience to underscore the real-world stakes of the co
-
"Bipartisan Bill to Tighten Vulnerability Disclosure Rules for Federal Contractors"US senators Mark R. Warner and James Lankford over the weekend announced the introduction of a bipartisan bill seeking tighter vulnerability disclosure rules for federal contractors.
-
"200k Impacted by East Valley Institute of Technology Data Breach"The East Valley Institute of Technology (EVIT) recently started informing over 200,000 individuals that their personal and health information was compromised in a recent data breach.
-
"How to Weaponize Microsoft Copilot for Cyberattackers"Companies are rapidly implementing Microsoft's Copilot Artificial Intelligence (AI)-based chatbots to improve data collection and time management. However, threat actors also benefit from Copilot.
-
"New AMD SinkClose Flaw Helps Install Nearly Undetectable Malware"AMD is warning about "SinkClose," a severe CPU vulnerability affecting multiple generations of EPYC, Ryzen, and Threadripper processors.
-
"AI May Create a Tidal Wave of Buggy, Vulnerable Software"Reliance on error-filled code written by generative Artificial Intelligence (AI) using Large Language Models (LLMs) is resulting in highly vulnerable software, according to Veracode Chief CTO and co-founder Chris Wysopal.
-
"Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools"The top three data exfiltration tools used by threat actors between September 2023 and July 2024 were Rclone, WinSCP, and cURL, according to ReliaQuest. Data exfiltration may involve threat actor–owned infrastructure or third-party cloud services.
-
"Vulnerability Allowed Eavesdropping via Sonos Smart Speakers"NCC Group researchers discovered vulnerabilities in Sonos smart speakers, including a flaw that could have enabled attackers to eavesdrop on users.
-
"CISA Warns About Actively Exploited Apache OFBiz RCE Flaw"The US Cybersecurity and Infrastructure Security Agency (CISA) warns of two vulnerabilities, including a path traversal flaw affecting Apache OFBiz.
-
"Phishing Attack Exploits Google, WhatsApp to Steal Data"Researchers at Menlo Security found a sophisticated phishing campaign that exploits users' trust in Google Drawings and WhatsApp.
-
"Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities"The US Cybersecurity and Infrastructure Security Agency (CISA) is warning organizations about threat actors targeting improperly configured Cisco devices.