Smashing Security podcast #334: Acoustic attacks, and the tears of a crypto rapper
Razzlekhan, the self-proclaimed Crocodile of Wall Street, pleads guilty to the biggest crypto laundering scheme in history, and just how safe are you typing while...
USN-6280-1: PyPDF2 vulnerability
It was discovered that PyPDF2 incorrectly handled PDF files with certain markers. If a user or automated system were tricked into processing a specially crafted...
#BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets
A number of popular crypto wallet providers have been affected by the vulnerabilities, including Coinbase WaaS, Zengo and Binance Read More
How to Create an Efficient Governance Control Program
You need to account for several factors when building an efficient governance control program. Here's how CIS SecureSuite can help. Read More
Rhysida Ransomware Analysis Reveals Vice Society Connection
Check Point highlighted the necessity of understanding the the entire attack process of ransomware groups Read More
Breach Connected to MOVEit Flaw Affects Missouri Medicaid Recipients
Information involved in the incident includes names, dates of birth and medical claims information Read More
High-Severity Access Control Vulnerability Found in Spring WebFlux
Tracked as CVE-2023-34034, the flaw has a CVSS score of 9.8 Read More
USN-6243-2: Graphite-Web regression
USN-6243-1 fixed vulnerabilities in Graphite-Web. It was discovered that the applied fix was incomplete. This update fixes the problem. Original advisory details: It was discovered...
USN-4336-3: GNU binutils vulnerabilities
USN-4336-1 fixed several vulnerabilities in GNU. This update provides the corresponding update for Ubuntu 14.04 LTS. Original advisory details: It was discovered that GNU binutils...
Using Machine Learning to Detect Keystrokes
Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards” Abstract:...