Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot ToolsMicrosoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool...
Day: March 27, 2023
New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords
New MacStealer macOS Malware Steals iCloud Keychain Data and PasswordsA new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information...
Where SSO Falls Short in Protecting SaaS
Where SSO Falls Short in Protecting SaaSSingle sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
20-Year-Old BreachForums Founder Faces Up to 5 Years in Prison
20-Year-Old BreachForums Founder Faces Up to 5 Years in PrisonConor Brian Fitzpatrick, the 20-year-old founder and the administrator of the now-defunct BreachForums has been formally charged in the...
Microsoft assigns CVE to Snipping Tool bug, pushes patch to Store
Microsoft assigns CVE to Snipping Tool bug, pushes patch to StoreMicrosoft says "successful exploitation requires uncommon user interaction", but it's the innocent and accidental leakage of...
The many faces of the IcedID attack kill chain
The many faces of the IcedID attack kill chainExecutive Summary The Menlo Labs Team noticed some very interesting and seemingly overlapping IcedID campaigns over the past...
An Approach to Resolving PKI Talent Scarcity
An Approach to Resolving PKI Talent ScarcityEvery year, the Ponemon Institute surveys more than 2,500 IT leaders who are immersed in... The post An Approach to...
AI/ML’s Role in Software Supply Chain Security
AI/ML’s Role in Software Supply Chain Security Almost every company has felt the impact of a cybersecurity incident caused by a security breakdown in the software...
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences Okta and Zoom today announced an integration through which cybersecurity administrators will be able to centrally manage...
More Cloud Identities, More Problems
More Cloud Identities, More ProblemsReading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an...
How OPA Helps Simplify Compliance and Create Custom Compliance Rules
How OPA Helps Simplify Compliance and Create Custom Compliance Rules Compliance with regulatory standards is essential for cloud environments, not only to meet legal requirements and...
USENIX Security ’22 – Antoon Purnal, Furkan Turan, Ingrid Verbauwhede – ‘Double Trouble: Combined Heterogeneous Attacks On Non-Inclusive Cache Hierarchies’
USENIX Security ’22 – Antoon Purnal, Furkan Turan, Ingrid Verbauwhede – ‘Double Trouble: Combined Heterogeneous Attacks On Non-Inclusive Cache Hierarchies’Our thanks to USENIX for publishing their...