Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot ToolsMicrosoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool...
Day: March 27, 2023
New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords
New MacStealer macOS Malware Steals iCloud Keychain Data and PasswordsA new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information...
Where SSO Falls Short in Protecting SaaS
Where SSO Falls Short in Protecting SaaSSingle sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
20-Year-Old BreachForums Founder Faces Up to 5 Years in Prison
20-Year-Old BreachForums Founder Faces Up to 5 Years in PrisonConor Brian Fitzpatrick, the 20-year-old founder and the administrator of the now-defunct BreachForums has been formally charged in the...
Microsoft assigns CVE to Snipping Tool bug, pushes patch to Store
Microsoft assigns CVE to Snipping Tool bug, pushes patch to StoreMicrosoft says "successful exploitation requires uncommon user interaction", but it's the innocent and accidental leakage of...
The many faces of the IcedID attack kill chain
The many faces of the IcedID attack kill chainExecutive Summary The Menlo Labs Team noticed some very interesting and seemingly overlapping IcedID campaigns over the past...
An Approach to Resolving PKI Talent Scarcity
An Approach to Resolving PKI Talent ScarcityEvery year, the Ponemon Institute surveys more than 2,500 IT leaders who are immersed in... The post An Approach to...
AI/ML’s Role in Software Supply Chain Security
AI/ML’s Role in Software Supply Chain Security Almost every company has felt the impact of a cybersecurity incident caused by a security breakdown in the software...
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences Okta and Zoom today announced an integration through which cybersecurity administrators will be able to centrally manage...
More Cloud Identities, More Problems
More Cloud Identities, More ProblemsReading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an...
How OPA Helps Simplify Compliance and Create Custom Compliance Rules
How OPA Helps Simplify Compliance and Create Custom Compliance Rules Compliance with regulatory standards is essential for cloud environments, not only to meet legal requirements and...
USENIX Security ’22 – Antoon Purnal, Furkan Turan, Ingrid Verbauwhede – ‘Double Trouble: Combined Heterogeneous Attacks On Non-Inclusive Cache Hierarchies’
USENIX Security ’22 – Antoon Purnal, Furkan Turan, Ingrid Verbauwhede – ‘Double Trouble: Combined Heterogeneous Attacks On Non-Inclusive Cache Hierarchies’Our thanks to USENIX for publishing their...
VS Code hack shows how supply chain attacks can extend to other software development tools
VS Code hack shows how supply chain attacks can extend to other software development tools From an information security perspective, 2022 can be called “The Year...
SANS First Look Report: Self-Supervised Learning Cybersecurity Platform for Threat Detection
SANS First Look Report: Self-Supervised Learning Cybersecurity Platform for Threat DetectionThe SANS Institute recently released an analyst First Look Report on MixMode titled, “Self-Supervised Learning Cybersecurity...
Synopsys Global Partner Program Receives CRN® 5-Star Rating for Second Consecutive Year
Synopsys Global Partner Program Receives CRN® 5-Star Rating for Second Consecutive Year The Synopsys Global Partner Program has received the CRN® 5-star rating for the second...
China crisis is a TikToking time bomb
China crisis is a TikToking time bombByteDance with the devil if you dare Opinion As country after country bans TikTok from official systems, it’s fair to...
Gone in 120 seconds: Tesla Model 3 child’s play for hackers
Gone in 120 seconds: Tesla Model 3 child's play for hackersPlus OIG finds Uncle Sam fibbed over Login.gov In brief A team of hackers from French...
Cybersecurity startups to watch for in 2023
Cybersecurity startups to watch for in 2023The problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than...
Best practices for protecting AWS RDS and other cloud databases
Best practices for protecting AWS RDS and other cloud databasesIt’s no surprise that organizations are increasingly using cloud-native services, including for data storage. Cloud storage offers...
France bans TikTok, all social media apps from government devices
France bans TikTok, all social media apps from government devicesThe French government has banned TikTok and all other “recreational apps” from phones issued to its employees....
Part of Twitter source code leaked on GitHub
Part of Twitter source code leaked on GitHubPart of Twitter’s source code has been leaked and posted on GitHub by an unknown user. GitHub took down...
Latitude Financial Admits Breach Impacted Millions
Latitude Financial Admits Breach Impacted MillionsOver 14 million records stolen from consumer lenderRead MoreOver 14 million records stolen from consumer lender
New BEC Tactics Enable Fake Asset Purchases
New BEC Tactics Enable Fake Asset PurchasesFBI warns of scammers using Net-30 and Net-60 termsRead MoreFBI warns of scammers using Net-30 and Net-60 terms
NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites
NCA Harvests Info on DDoS-For-Hire With Fake Booter SitesAgency attempts to disrupt the cybercrime undergroundRead MoreAgency attempts to disrupt the cybercrime underground
New MacStealer Targets Catalina, Newer MacOS Versions
New MacStealer Targets Catalina, Newer MacOS VersionsThe malware can extract information from documents, browser cookies and login informationRead MoreThe malware can extract information from documents, browser...
Three Variants of IcedID Malware Discovered
Three Variants of IcedID Malware DiscoveredThe new variants hint that considerable effort is going into the future of IcedID and its codebaseRead MoreThe new variants hint...
Microsoft Fixes Security Flaw in Windows Screenshot Tools
Microsoft Fixes Security Flaw in Windows Screenshot ToolsInformation disclosure vulnerability aCropalypse could enable malicious actors to recover sections of screenshotsRead MoreInformation disclosure vulnerability aCropalypse could enable...
Malicious Python Package uses Unicode support to evade detection
Malicious Python Package uses Unicode support to evade detection Researchers discovered a malicious package on PyPI that uses Unicode to evade detection while stealing sensitive data. Supply...
Technical analysis of China-linked Earth Preta APT’s infection chain
Technical analysis of China-linked Earth Preta APT’s infection chainChina-linked Earth Preta cyberespionage group has been observed adopting new techniques to bypass security solutions. Trend Micro researchers reported...
Updates from the MaaS: new threats delivered through NullMixer
Updates from the MaaS: new threats delivered through NullMixerA technical analysis of NullMixer malware operation revealed Italy and France are the favorite European countries from the...