-
"TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks"The threat actor known as "TA558" has been using steganography as an obfuscation method in the delivery of a variety of malware, including Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, XWorm, and more.
-
"PuTTY SSH Client Flaw Allows Recovery of Cryptographic Private Keys"Fabian Baumer and Marcus Brinkmann from Ruhr University Bochum discovered a vulnerability in PuTTY 0.68 through 0.80 that enables attackers with access to 60 cryptographic signatures to recover the private key used to generate them.
-
"Ransomware Group Starts Leaking Data Allegedly Stolen From Change Healthcare"The "RansomHub" ransomware group is now publishing data allegedly stolen from the healthcare transaction processor Change Healthcare in February. The incident disrupted Change Healthcare's operations and caused healthcare system outages.
-
"Report Suggests 93% of Breaches Lead to Downtime and Data Loss"According to security researchers at Pentera, a substantial 93% of enterprises admitting to a breach have suffered significant consequences, ranging from unplanned downtime to data exposure or financial loss.
-
"LeakyCLI Flaw Exposes AWS and Google Cloud Credentials"A new security flaw, dubbed "LeakyCLI" by the Orca Security team, impacts command-line tools used in cloud environments.
-
"Former Security Engineer Sentenced to Prison for Hacking Crypto Exchanges"Recently, Shakeeb Ahmed, a former senior security engineer, was sentenced to three years in prison for hacking and defrauding two cryptocurrency exchanges.
-
"Security Vulnerability in Browser Interface Allows Computer Access via Graphics Card"Researchers from the Institute of Applied Information Processing and Communications at Graz University of Technology (TU Graz) successfully demonstrated three side-channel attacks on graphics cards via the WebGPU browser interface.
-
"Web3 Game Developers Targeted in Crypto Theft Scheme"A Russian threat actor is targeting game developers with fraudulent Web3 gaming projects that install multiple variants of infostealers on macOS and Windows devices.
-
"Two People Arrested in Australia and US for Development and Sale of Hive RAT"Authorities in Australia and the US recently announced the arrest and indictment of two individuals for their roles in developing and selling the Hive remote access trojan (RAT).
-
"NSA Publishes Guidance for Strengthening AI System Security"The National Security Agency (NSA) has published a Cybersecurity Information Sheet (CSI) titled "Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems." The CSI aims to help National Security System (NSS) owners an
-
"Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw"According to Binarly, there is an unpatched security flaw impacting the Lighttpd web server in Intel and Lenovo Baseboard Management Controllers (BMCs).
-
"Defense Award Launches Purdue Project to Strengthen Cyber-Physical Systems"Purdue University researchers have launched a multidisciplinary project to model, simulate, and analyze Cyber-Physical Systems (CPS), aiming to improve system robustness and make system analysis more scalable and effective.
News