Security Analysis of the EU’s Digital Wallet
A group of cryptographers have analyzed the eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet. Read More
US Charges Russian Individual for Pre-Invasion Ukraine Hack
The US government is offering up to $10m for information on Amin Timovich Stigal’s location or his malicious cyber activity Read More
USN-6857-1: Squid vulnerabilities
Joshua Rogers discovered that Squid incorrectly handled requests with the urn: scheme. A remote attacker could possibly use this issue to cause Squid to consume...
USN-6852-2: Wget vulnerability
USN-6852-1 fixed a vulnerability in Wget. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was...
Memory Dump Analysis: Using LiME for Acquisition and Volatility for Initial Setup
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information...
USN-6856-1: FontForge vulnerabilities
It was discovered that FontForge incorrectly handled filenames. If a user or an automated system were tricked into opening a specially crafted input file, a...
IT Leaders Are Fifty-Fifty on Using GenAI For Cybersecurity
Corelight study claims many IT leaders see benefit of GenAI but similar share are concerned about data exposure Read More
US charges four FIN9-linked hackers after $71 million cybercrime spree
Four alleged members of the FIN9 cybercrime gang have been charged in relation to a series of hacks that caused over US $71 million of...
Chinese State Actors Use Ransomware to Conceal Real Intent
A new report warns that Chinese APT groups are using ransomware to conceal cyber-espionage activity Read More
Polyfill.io Supply Chain Attack
What is the attack?Over 100,000+ sites have been impacted by a supply chain attack involving the Polyfill.io service. Polyfill is a popular tool used for...