News

  • Shein App Accessed Clipboard Data on Android Devices

    PRIVACY PRIVACY The findings come from Microsoft, in an advisory published on Monday Read More

    Read More

  • Ransomware Attack Against Barcelona Hospital Disrupts Operations

    PRIVACY PRIVACY A Catalonia government statement attributed the attack to the threat actor known as RansomHouse Read More

    Read More

  • Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage

    PRIVACY PRIVACY Russian state-backed hackers is shifting from disruption tactics, with the likes of wiper attacks, to cyber espionage Read More

    Read More

  • Attack campaign uses PHP-based infostealer to target Facebook business accounts

    PRIVACY PRIVACY Over the past year, a group of attackers has targeted Facebook business account owners by spreading information stealing malware through malicious Google ads or fake Facebook profiles. The infection chain uses DLL sideloading via legitimate apps, as well as self-contained executable files written in various programming languages such as Rust, Python, and PHP.…

    Read More

  • Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You

    PRIVACY PRIVACY It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have truly shaped the late 20th century and will continue to do so for the foreseeable future. But while users have become accustomed to having almost everything they could ever want at fingertips length,…

    Read More

  • How the Foundational Assessment Makes Starting or Improving a Cybersecurity Program Easier

    PRIVACY PRIVACY The Foundational Assessment is designed to help guide SLTT organizations through the first 12-24 months of developing your cybersecurity program. […] Read More

    Read More

  • MS-ISAC: 20 Years as Your Trusted Cyber Defense Community

    PRIVACY PRIVACY It’s the 20th anniversary of our Multi-State Information Sharing and Analysis Center (MS-ISAC). That’s 20 years as your trusted cyber defense community. […] Read More

    Read More

  • Just 10% of Firms Can Resolve Cloud Threats in an Hour

    PRIVACY PRIVACY Tool bloat is making it harder to detect and contain attacks Read More

    Read More

  • Prompt Injection Attacks on Large Language Models

    PRIVACY PRIVACY This is a good survey on prompt injection attacks on large language models (like ChatGPT). Abstract: We are currently witnessing dramatic advances in the capabilities of Large Language Models (LLMs). They are already being adopted in practice and integrated into many systems, including integrated development environments (IDEs) and search engines. The functionalities of…

    Read More

  • Akamai releases new threat hunting tool backed by Guardicore capabilities

    PRIVACY PRIVACY Akamai on Tuesday launched Akamai Hunt, a visibility tool that uses the infrastructure of microsegmentation platform Guardicore to allow customers to identify and remediate threats and risks in their cloud environments. Akamai acquired Guardicore in October 2022 for about $600 million. Akamai Hunt combines Akamai’s historic data with Guardicore’s network segmentation and visualization…

    Read More

News, Advisories and much more

Exit mobile version