Shein's Android App Caught Transmitting Clipboard Data to Remote ServersAn older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to...
Day: March 7, 2023
Serious Security: TPM 2.0 vulns – is your super-secure data at risk?
Serious Security: TPM 2.0 vulns – is your super-secure data at risk?Security bugs in the very code you've been told you must have to improve the...
Hybrid Systems: AI and Humans Need Each Other for Effective Cybersecurity
Hybrid Systems: AI and Humans Need Each Other for Effective Cybersecurity The sudden mainstreaming of chatbots and generative AI like ChatGPT has a lot of people...
3 Things Businesses Need to Know About Safely Employing Contractors
3 Things Businesses Need to Know About Safely Employing ContractorsMany organizations are turning to consultants and external groups for help, but this approach can be risky...
How federal agencies can prevent evasive web threats
How federal agencies can prevent evasive web threats2023 is shaping up to be a transformative year for security teams in the federal government. Regulations, such as...
Dismantling the Ransomware Business Model
Dismantling the Ransomware Business Model Every day, coordinated crime groups are developing more advanced skills to attack organisations’ networks. The number of ransomware attacks has increased...
Introducing The Complete Guide to SecDataOps and Vulnerability Management on AWS
Introducing The Complete Guide to SecDataOps and Vulnerability Management on AWS After going back and forth with my LinkedIn followers in mid-2022 about a post on...
How to Secure Microsoft 365 in 2023
How to Secure Microsoft 365 in 2023 By a wide margin, Microsoft 365 is the world’s most popular productivity software with over 180 million users globally....
Women’s Day: Naomi Buckwalter & Megan Baker | Code Patrol podcast | Contrast Security
Women’s Day: Naomi Buckwalter & Megan Baker | Code Patrol podcast | Contrast Security Happy International Women’s Day, happy Women’s History Month! The post Women’s Day:...
USENIX Security ’22 – Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee – ‘MOVERY: A Precise Approach For Modified Vulnerable Code Clone Discovery From Modified Open-Source Software Components’
USENIX Security ’22 – Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee – ‘MOVERY: A Precise Approach For Modified Vulnerable Code Clone Discovery From Modified Open-Source...
Aite-Novarica Names Radware’s Bot Manager Solution Best-In-Class
Aite-Novarica Names Radware’s Bot Manager Solution Best-In-ClassThe Aite Matrix: Leading Bot Detection and Management Provders report shows Radware as the leader among the ten vendors Aite-Novarica...
KubeCrash Spring 2023 is Here! Learn From Crash Courses on Cloud Native
KubeCrash Spring 2023 is Here! Learn From Crash Courses on Cloud Native KubeCon EU is just around the corner, so KubeCrash, the Amsterdam warm-up event, is...
Pro-Putin scammers trick politicians and celebrities into low-tech hoax video calls
Pro-Putin scammers trick politicians and celebrities into low-tech hoax video callsWho needs deepfakes when you've got makeup and 'element of surprise'? Pro-Russian scammers using social engineering...
What is zero trust? A model for more effective security
What is zero trust? A model for more effective securitySecurity leaders are embracing zero trust, with the vast majority of organizations either implementing or planning to...
Akamai releases new threat hunting tool backed by Guardicore capabilities
Akamai releases new threat hunting tool backed by Guardicore capabilitiesAkamai on Tuesday launched Akamai Hunt, a visibility tool that uses the infrastructure of microsegmentation platform Guardicore...
Attack campaign uses PHP-based infostealer to target Facebook business accounts
Attack campaign uses PHP-based infostealer to target Facebook business accountsOver the past year, a group of attackers has targeted Facebook business account owners by spreading information...
Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials
Love scam or espionage? Transparent Tribe lures Indian and Pakistani officialsESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android...
Two-Thirds of European Firms Have Started Zero Trust
Two-Thirds of European Firms Have Started Zero TrustForrester claims public sector is leading the wayRead MoreForrester claims public sector is leading the way
Brazilian Conglomerate Suffers 3TB Data Breach: Report
Brazilian Conglomerate Suffers 3TB Data Breach: Report"Dark Angels" hacking group targets Andrade GutierrezRead More"Dark Angels" hacking group targets Andrade Gutierrez
Russian Disinformation Campaign Records High-Profile Individuals on Camera
Russian Disinformation Campaign Records High-Profile Individuals on CameraProofpoint has detailed a sophisticated disinformation campaign in which high-profile individuals are duped into embarrassing comments on videoRead MoreProofpoint...
Just 10% of Firms Can Resolve Cloud Threats in an Hour
Just 10% of Firms Can Resolve Cloud Threats in an HourTool bloat is making it harder to detect and contain attacksRead MoreTool bloat is making it...
Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage
Russia's Cyber Tactics in Ukraine Shift to Focus on EspionageRussian state-backed hackers is shifting from disruption tactics, with the likes of wiper attacks, to cyber espionageRead...
Ransomware Attack Against Barcelona Hospital Disrupts Operations
Ransomware Attack Against Barcelona Hospital Disrupts OperationsA Catalonia government statement attributed the attack to the threat actor known as RansomHouseRead MoreA Catalonia government statement attributed the...
Shein App Accessed Clipboard Data on Android Devices
Shein App Accessed Clipboard Data on Android DevicesThe findings come from Microsoft, in an advisory published on MondayRead MoreThe findings come from Microsoft, in an advisory...
Sharp Panda Target Southeast Asia in Espionage Campaign Expansion
Sharp Panda Target Southeast Asia in Espionage Campaign ExpansionNew campaign leverages a new version of the SoulSearcher loader and the Soul modular frameworkRead MoreNew campaign leverages...
LastPass hack caused by an unpatched Plex software on an employee’s PC
LastPass hack caused by an unpatched Plex software on an employee’s PCThe LastPass data breach was caused by the failure to update Plex on the home...
Expert released PoC exploit code for critical Microsoft Word RCE flaw
Expert released PoC exploit code for critical Microsoft Word RCE flawSecurity researcher released a proof-of-concept exploit code for a critical flaw, tracked as CVE-2023-21716, in Microsoft...
Acer discloses a new data breach, 160 GB of sensitive data available for sale
Acer discloses a new data breach, 160 GB of sensitive data available for saleTaiwanese multinational hardware and electronics corporation Acer discloses a data breach after a threat actor...
Find Out More About the New HiatusRAT Router Malware
Find Out More About the New HiatusRAT Router MalwareAn ongoing campaign is targeting business routers using a new malware, the HiatusRAT router malware. The Hiatus campaign...
Hospital Clinic de Barcelona Suffered a Ransomware Attack
Hospital Clinic de Barcelona Suffered a Ransomware AttackHospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a ransomware attack that crippled...