News
-
"FBI: Thousands of Remote IT Workers Sent Wages to North Korea to Help Fund Weapons Program"The FBI and Department of Justice (DoJ) have recently announced that thousands of information technology workers contracting with U.S.
-
"Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover"Eight recently discovered vulnerabilities in the SolarWinds Access Rights Manager Tool (ARM), including three of critical severity, could allow attackers to gain access to unpatched systems with the highest levels of privilege.
-
"'Disappearing' Implants, Followed by First Fixes for Exploited Cisco IOS XE Zero-Day"Cisco has released the first fixes for the IOS XE zero-day vulnerability, tracked as CVE-2023-20198, which attackers exploited to deliver a malicious implant.
-
"Low-Power Hardware Accelerator Offers Outsize Security"A research team in the US has developed a novel hardware accelerator prototype for edge devices that can encrypt cloud-sent and -received messages with 1,000 to 6,000 times the energy efficiency of a standard RISC-V processor.
-
"Okta Breached Via Stolen Credential"Identity and access management (IAM) specialist Okta has recently found itself on the receiving end of another security breach after a threat actor was able to access a stolen credential.
-
"Your Browser Extension Could Grab Your Password and Sensitive Info"A team of digital security researchers at the University of Wisconsin-Madison discovered that some widely used websites are vulnerable to browser extensions capable of extracting sensitive information from HTML code, including passwords, credit card nu
-
"ICC: September Breach Was Espionage Raid"The International Criminal Court (ICC) has recently revealed that a September cyberattack on its IT systems was a highly targeted espionage attempt, although attribution thus far remains elusive.
-
"Cybersecurity: IMC2 Researchers Mobilize to Counter Insider Threats"Polytechnique Montréal has announced a cybersecurity project to prevent insider threats.
-
"CIA Exposed to Potential Intelligence Interception Due to X's URL Bug"Kevin McSheehan, an ethical hacker, took over a Central Intelligence Agency (CIA) Telegram channel used to receive intelligence by exploiting a flaw in how X, formerly Twitter, truncates URLs.
-
"Legacy Authentication Leads to Growing Consumer Frustration"According to FIDO Alliance, consumers want stronger, more user-friendly alternatives to passwords despite their continued widespread use.
-
"Iran-Backed Hackers Dwelled for 8 Months in Mideast Government's System"According to researchers, Iran-backed hackers spent eight months inside the systems of a Middle East government, stealing emails and files.
-
"ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges"ExelaStealer, a new information stealer, has joined the field of off-the-shelf malware designed to steal sensitive data from compromised Windows systems.