News
-
"OpenSSH Vulnerability Uncovered by Researchers, RCE Exploit Developed"Researchers have discovered a vulnerability in the secure networking suite OpenSSH, tracked as CVE-2023-38408, that would enable hackers to remotely execute code using simple commands. Exploiting the vulnerability involves the helper program in OpenSSH…
-
"Anonymous Sudan DDoS Strikes Dominate Attacks by KillNet Collective"The capabilities of the hacktivist collective KillNet have grown considerably over the past six months, as its largest affiliate, Anonymous Sudan, claimed responsibility for a wave of Distributed Denial-of-Service (DDoS) attacks. KillNet's affiliates…
-
"Half of AI Open Source Projects Reference Buggy Packages"According to security researchers at Endor Labs, open source is playing a growing role across the AI technology stack, but most (52%) projects reference known vulnerable dependencies in their manifest files. The researchers claimed that just five…
-
"Ukraine's Cyber Police Dismantled a Massive Bot Farm Spreading Propaganda"The National Police of Ukraine's Cyber Police Department dismantled a massive bot farm, seizing computer equipment, mobile phones, over 250 GSM gateways, and about 150,000 SIM cards. In support of the Russian government and its narrative on the…
-
"Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats"After facing criticism following a recent espionage attack campaign aimed at its email infrastructure, Microsoft has announced that it will expand cloud logging capabilities to help organizations investigate cybersecurity incidents and gain more…
-
"OpenAI Credentials Stolen by the Thousands for Sale on the Dark Web"With hundreds of thousands of OpenAI credentials for sale on the dark web and access to a malicious alternative for ChatGPT, threat actors are displaying a growing interest in generative Artificial Intelligence (AI) tools. Less skilled and advanced…
-
"Microsoft Exchange Servers Compromised by Turla APT"Turla, also known as Secret Blizzard, Snake, and UAC-0003, has been targeting defense sector organizations in Ukraine and Eastern Europe with DeliveryCheck and Kazuar backdoors and infostealers. The group has also been controlling them with compromised…
-
"P2P Self-Replicating Cloud Worm Targets Redis"Researchers have discovered a cross-platform, Rust-based, peer-to-peer (P2) worm that targets the Redis open source database application, specifically containers in the cloud. Palo Alto Network's Unit 42 released a report naming the cloud malware "…
-
"A Surprisingly Simple Way to Foil Car Thieves"Growing vehicle technology sophistication can make cars more vulnerable to hacking and theft. A research team led by the University of Michigan has developed a solution that involves what is considered to be the lowest-technology feature of modern…
-
"Registering Refugees Using Personal Information Has Become the Norm – But Cybersecurity Breaches Pose Risks to People Giving Sensitive Biometric Data"In 2022, the number of refugees worldwide reached high levels as over 108.4 million people have been forced to leave their homes due to persecution or violence. In the meantime, governments and aid organizations increasingly use biometrics for…
-
"WormGPT Might Become Hackers' New Best Imaginary Friend"WormGPT is a new, custom-trained version of a Large Language Model (LLM) based on the GPT-J language model released in 2021. It is a conversational tool developed and trained to write and deploy black hat code and tools. WormGPT allows users to develop…
-
"Securing the Oil and Gas Industry"The oil and gas industry continues to be a critical pillar of the global economy, supporting millions of jobs worldwide and providing essential energy for households, businesses, and transportation. However, as digital technology increasingly permeates…