News
-
"Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts"Threat actors can use Amazon Web Services Security Token Service (AWS STS) to infiltrate cloud accounts and launch follow-on attacks.
-
"How AI Is Revolutionizing 'Shift Left' Testing in API Security"Preventing exploitable vulnerabilities requires catching coding errors in Application Programming Interface (API) preproduction before they go live.
-
"Chrome 120 Patches 10 Vulnerabilities"Google recently announced the release of Chrome 120 to the stable channel with patches for 10 vulnerabilities.
-
"HTC Global Services Confirms Cyberattack After Data Leaked Online"IT services and business consulting company HTC Global Services has recently confirmed that they suffered a cyberattack after the ALPHV ransomware gang began leaking screenshots of stolen data.
-
"LLMs Open to Manipulation Using Doctored Images, Audio"According to Cornell University researchers, attackers could manipulate responses to user prompts from Large Language Models (LLMs) behind Artificial Intelligence (AI) chatbots like ChatGPT by hiding malicious instructions in strategically placed
-
"Multiple NFT Collections at Risk by Flaw in Open-Source Library"A vulnerability in an open-source library used widely in the Web3 space compromises the security of pre-built smart contracts, impacting many NFT collections, including Coinbase.
-
"Nissan is Investigating Cyberattack And Potential Data Breach"Japanese car maker Nissan is investigating a recent cyberattack that targeted its systems in Australia and New Zealand, which may have let hackers access personal information.
-
"LockBit Remains Top Global Ransomware Threat"According to security researchers at ZeroFox, the LockBit ransomware strain continues to be the primary digital extortion threat to all regions and almost all industries globally.
-
"21 Vulnerabilities in Sierra Wireless Routers Could Expose Critical Infrastructure to Attacks"According to security researchers at Forescout, some Sierra Wireless cellular routers are affected by 21 vulnerabilities, including ones that could pose a significant risk to impacted organizations, including in critical infrastructure sectors.
-
"CISA Urges Federal Agencies to Patch Exploited Qualcomm Vulnerabilities"The US cybersecurity agency CISA recently added four bugs impacting multiple Qualcomm chipsets to its Known Exploited Vulnerabilities (KEV) Catalog.
-
"AI Networks Are More Vulnerable to Malicious Attacks Than Previously Thought"North Carolina State University researchers discovered that Artificial Intelligence (AI) tools are more vulnerable than previously thought to attacks aimed at forcing AI systems to make bad decisions.
-
"ENISA Published 'ENISA Threat Landscape for DoS Attacks'"In recent years, there has been more access to cost-effective and efficient means and services for executing Denial-of-Service (DoS) attacks. Ongoing global conflicts have sparked many DoS attacks.