Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
Read moreChinese Hacking of US Critical Infrastructure
May 31 2023Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the group, called Volt Typhoon, accesses target networks...
Read moreBy finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
Read moreSome companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.
Read moreAs the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community.
Read moreDiscord Admins Hacked by Malicious Bookmarks
May 31 2023A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser...
Read moreOn-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
Read more421M Spyware Apps Downloaded Through Google Play
May 31 2023A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.
Read moreTargeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.
Read moreWhat good is a popup asking for your approval if an attacker can bypass it simply by suppressing it?
Read more
Recent Comments