An attacker could perform RCE on a server verifying a maliciously crafted JWT request
More Stories
Vulnerability Exploitation on the Rise as Attacker Ditch Phishing
Mandiant’s latest M-Trends report found that vulnerability exploitation was the most common initial infection vector in 2023, making up 38%...
Microsoft and Security Incentives
Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their...
Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites
Notorious APT44 group Sandworm launched a major campaign against Ukrainian critical infrastructure in March Read More
Russian APT28 Group in New “GooseEgg” Hacking Campaign
Microsoft has warned of a long-running credential stealing campaign from Russia’s APT28 Read More
Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme
The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was sentenced last week to nine...
Fraudsters Exploit Telegram’s Popularity for Toncoin Scam
The scheme was uncovered by Kaspersky and has been operational since November 2023 Read More