News
-
"'Leaky Vessels' Cloud Bugs Allow Container Escapes Globally"Researchers have discovered four vulnerabilities, collectively called "Leaky Vessels," in container engine components. Three of the vulnerabilities enable attackers to break out of containers and perform malicious actions on the host system.
-
"Pump-and-Dump Schemes Make Crypto Fraudsters $240m"According to security researchers at Chainalysis, market manipulators may have made over $240m last year by artificially inflating the value of Ethereum tokens.
-
"New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol"The National Institute of Standards and Technology (NIST) has released a practice guide covering methods aimed at helping major industries implement the Internet security protocol TLS 1.3, as well as conduct network monitoring and auditing safely
-
"Europcar Dismisses Data Leak Claims as AI Fake"Europcar, a global car rental company, has denied claims of a data breach, arguing that the Europcar data posted online by threat actors was generated using ChatGPT, the Artificial Intelligence (AI)-powered chatbot.
-
"Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware"According to Guardio Labs researchers, the phishing ecosystem has been made highly accessible due to Telegram's emergence as a hub for cybercrime, allowing threat actors to launch massive attacks inexpensively.
-
"A Zero-Day Vulnerability (And PoC) to Blind Defenses Relying on Windows Event Logs"A zero-day vulnerability, discovered by a security researcher named Florian and reported to Microsoft, has the potential to crash the Windows Event Log service on all supported (and some legacy) versions of Windows.
-
"Hack of PJ&A Tops 2023 US Healthcare Data Breaches as Tally Jumps by 4M"An attack on the medical transcription company Perry Johnson & Associates (PJ&A) is now considered the largest US health sector data breach that occurred in 2023.
-
"New Linux glibc Flaw Lets Attackers Get Root on Major Distros"Attackers can gain root access on multiple major Linux distributions in their default configurations by exploiting a Local Privilege Escalation (LPE) vulnerability in the GNU C Library (glibc).
-
"CyberArk Releases Online Ransomware Decryptor"CyberArk has released an online version of its open-source White Phoenix ransomware decryptor to help ransomware victims recover their files.
-
"Ivanti Zero-Day Patches Delayed as 'KrustyLoader' Attacks Mount"Attackers exploited a pair of now-patched critical zero-day vulnerabilities in Ivanti VPNs.
-
"Leaked GitHub Token Exposed Mercedes Source Code"According to security researchers at RedHunt, a GitHub token leaked by a Mercedes-Benz employee provided access to all the source code stored on the carmaker’s GitHub Enterprise server.
-
"US Sanctions Two ISIS-Affiliated Cybersecurity Experts"The US Treasury Department recently announced sanctions against two "cybersecurity experts" accused of running a platform affiliated with the Islamic State group. The sanctioned individuals are both Egyptian nationals.