-
"The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools"The SafeBreach Labs team looked into the viability of using Windows thread pools as a novel attack vector for process injection.
-
"New Report: Over 40% of Google Drive Files Contain Sensitive Info"According to security researchers at Metomic, 40.2% of files stored on Google Drive contain sensitive data. The researchers analyzed roughly 6.5 million Google Drive files.
-
"New Bluetooth Flaw Lets Hackers Take Over Android, Linux, macOS, and iOS Devices"Threat actors could use a critical Bluetooth security flaw to take control of Android, Linux, macOS, and iOS devices.
-
"Vulns in Android WebView, Password Managers Can Leak User Credentials"Researchers have shown that most popular password managers can leak credentials from Android devices when using the mobile operating system's WebView autofill function with malicious apps.
-
"Researchers Automated Jailbreaking of LLMs With Other LLMs"Artificial Intelligence (AI) security researchers from Robust Intelligence and Yale University have developed a Machine Learning (ML) method that can quickly jailbreak Large Language Models (LLMs) and do so in an automated way.
-
"For Domestic Violence Victim-Survivors, a Data or Privacy Breach Can Be Extraordinarily Dangerous"Cybersecurity data breaches present unique risks for victim-survivors of domestic violence.
-
"Ninety Percent of Energy Companies Suffer Supplier Data Breach"According to security researchers at SecurityScorecard, almost all (90%) of the world’s 48 biggest energy companies have suffered a supply chain data breach in the past 12 months.
-
"New SLAM Attack Steals Sensitive Data From AMD, Future Intel CPUs"Researchers from the Systems and Network Security Group (VUSec Group) at Vrije Universiteit Amsterdam have developed "Spectre based on LAM" (SLAM), a new side-channel attack that uses hardware features designed to improve security in upcoming Intel, AM
-
"UC Researchers Work on Knowledge Graph to Help Small Businesses Tackle Cybersecurity"As part of a new research project, Dr. Rosetta Romano, an assistant professor in Information Technology (IT) and Systems at the University of Canberra, will help small businesses by educating them about the criticality of cybersecurity. Dr.
-
"The Ethics of Synthetic Data and Its Impact on Cybersecurity Algorithms"Synthetic data can be used to improve cybersecurity algorithms, such as facial recognition and fingerprint matching. These applications have the potential to improve suspect identification in law enforcement and streamline border control processes.
-
"US and International Partners Issue Recommendations to Secure Software Products Through Memory Safety"The National Security Agency (NSA) has joined the Cybersecurity and Infrastructure Security Agency (CISA) and other US and international partners in releasing a Cybersecurity Information Sheet (CSI) titled "The Case for Memory Safe Roadmaps." The
-
"Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware"The recently released Cisco Talos Year in Review report highlights new trends in the cybersecurity threat landscape.
News