News
-
"Hackers Exploit Flaw in Squarespace Migration to Hijack Domains"Hackers have compromised multiple domain names registered with Squarespace, leaving several cryptocurrency platforms scrambling to regain control of their Domain Name System (DNS) records.
-
"Organizations Warned of Exploited GeoServer Vulnerability"The US cybersecurity agency CISA recently urged federal agencies to patch a critical severity vulnerability in GeoServer as soon as possible, warning of evidence of active exploitation.
-
"Hacktivists Claim Leak Over 1 Terabyte of Disney Data"A hacktivist group recently claimed to have stolen and leaked over a terabyte of data from Diseny's internal slack channels.
-
"3 API Security Risks and Recommendations for Mitigation"Reconnaissance is one of the most time-consuming parts of network attack planning for adversaries.
-
"NSA's Final Zero Trust Pillar Report Outlines How to Achieve Faster Threat Response Time"The National Security Agency (NSA) has released a new Cybersecurity Information Sheet (CSI) titled "Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar" to help organizations detect cyber threats and respond to threats more
-
"New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection"Researchers have discovered a new ransomware strain called "HardBit" that uses new obfuscation methods to avoid analysis. Cybereason researchers found that HardBit ransomware 4.0 added passphrase protection.
-
"Microsoft Says Windows Not Impacted by regreSSHion as Second OpenSSH Bug Is Found"A second Remote Code Execution (RCE) vulnerability has been found in OpenSSH in an analysis of the recently discovered "regreSSHion" flaw. The regreSSHion bug, discovered by Qualys, was believed to impact millions of OpenSSH servers.
-
"Attackers Exploit URL Protections to Disguise Phishing Links"Barracuda researchers found cybercriminals using URL protection services to hide phishing links. The company observed phishing campaigns using three URL protection services to mask phishing URLs and send victims to credential-stealing websites.
-
"Hackers Beware: Research Shows AI Can Assist With Cybersecurity"According to a recent paper by University of Missouri researcher Prasad Calyam and collaborators from Amrita University in India, Artificial Intelligence (AI)-powered chatbots can pass a cybersecurity exam but should not be relied on for complete
-
"A Simple Firmware Update Completely Hides a Device's Bluetooth Fingerprint"A smartphone's unique Bluetooth fingerprint could be used to track the device's user. To eliminate this vulnerability, a team of researchers at UC San Diego has developed a simple firmware update that completely hides the Bluetooth fingerprint.
-
"New Blast-RADIUS Attack Breaks 30-Year-Old Protocol Used in Networks Everywhere"One of the most widely used network protocols, Remote Authentication Dial-In User Service (RADIUS), is vulnerable to a newly discovered attack called "Blast-RADIUS." This complex attack enables adversaries to gain control over various environments, inc
-
"NIST Will Fire the 'Starting Gun' in the Race to Quantum Encryption"ML-KEM, CRYSTALS-Dilithium, and Sphinx Plus are three standardized post-quantum algorithms that will allow classical computers to encrypt data against a future fault-tolerant quantum computer.