News
-
"Counterfit: Open-Source Tool for Testing the Security of AI Systems"Microsoft has decided to open-source a tool it developed to test the security of its own Artificial Intelligence (AI) systems and assess them for vulnerabilities. The tool named Counterfit will help organizations verify the robustness, reliability, and…
-
"US Organizations Targeted by New Cybercrime Group With Sophisticated Malware"A new financially motivated threat actor has targeted a number of organizations in the US and other countries using sophisticated malware. FireEye tracks the threat actor as UNC2529, which has used a sizable command-and-control (C&C) infrastructure,…
-
"DDoS Attack Knocks Belgian Government Websites Offline"Many government websites and services in Belgium were knocked offline on Tuesday after Belnet, the internet service provider (ISP) for the country’s public sector, was hit by a massive distributed denial-of-service (DDoS) attack. Belnet stated that…
-
"Researcher Claims Peloton APIs Exposed All Users Data"Security researchers from the Pen Test Partners have discovered several issues with the software used by exercise equipment maker Peloton, which may have leaked sensitive customer information to unauthenticated users. The researchers stated that…
-
"Rust-Based Buer Malware Variant Emerges"The cybercriminals behind the Buer malware loader are using a new variant called RustyBuer. According to researchers with Proofpoint, the variant is rewritten in the Rust programming language to evade detection and increase the effectiveness of the…
-
"UNICC and Group-IB Take Down 134 Fake Websites Impersonating WHO"Group-IB and the United Nations International Computing Centre (UNICC) took down a massive spam campaign involving 134 fraudulent websites. The fake websites were discovered impersonating the World Health Organization (WHO) on World Health Day,…
-
"Misconfigs and Unpatched Bugs Top Cloud Native Security Incidents"Researchers from Snyk conducted a new survey and discovered that over half of organizations had suffered a security incident due to misconfiguration or a known vulnerability in their cloud native applications. The adoption of cloud native…
-
"Panda Stealer Targets Crypto Wallets"A new information stealer called Panda Stealer is going after cryptocurrency wallets and credentials for applications including NordVPN, Telegram, Discord, and Steam. Panda Stealer uses spam emails and the same hard-to-detect fileless distribution…
-
"PHP Composer Flaw That Could Affect Millions of Sites Patched"A patch has been released for a critical vulnerability in PHP Composer, a tool used for the management and installment of software dependencies in the PHP ecosystem. According to the security researchers at SonarSource, who discovered the flaw, it could…
-
"Zero-Knowledge Proofs in Vulnerability Disclosure"Cybersecurity researchers and software security analysts face several challenges in the disclosure process for software vulnerabilities. They are faced with an ethics versus efficacy dilemma in the realm of security bug reporting and sharing. Publicly…
-
"New Protocol Makes Bitcoin Transactions More Secure and Faster Than Lightning"In collaboration with researchers at the IMDEA Software Institute and the Purdue University, the security and privacy research unit at TU Wien analyzed problems associated with Bitcoin transactions such as possible fraud, users' discovery of each other's…