SecurityTicks

X tries to win back advertisers with brand safety promises

X tries to win back advertisers with brand safety promises 10/08/2023 at 00:03 By Brandon Vigliarolo Meanwhile, platform keeps paying creators a share of ad revenue, but without similar safety features The site formerly known as Twitter is trying yet again to lure advertisers back, this time with a series of brand safety concessions that […]

React to this headline:

Loading spinner

X tries to win back advertisers with brand safety promises Read More »

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you 09/08/2023 at 23:49 By Iain Thomson If you’re so smart, prove it by safeguarding our infrastructure Black Hat  In a surprise announcement at the opening Black Hat keynote today, DARPA unveiled what it’s called an AI Cyber Challenge (AIxCC).

React to this headline:

Loading spinner

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you Read More »

Say hello to Downfall, another data-leaking security hole in several years of Intel chips

Say hello to Downfall, another data-leaking security hole in several years of Intel chips 09/08/2023 at 22:47 By Thomas Claburn It is with a heavy heart that we must announce that the boffins are at it again Black Hat  Googlers have lately found not one but two more security vulnerabilities in Intel and AMD processors

React to this headline:

Loading spinner

Say hello to Downfall, another data-leaking security hole in several years of Intel chips Read More »

Researchers discover algorithm to create shapes that roll down pre-determined paths

Researchers discover algorithm to create shapes that roll down pre-determined paths 09/08/2023 at 22:35 By Lindsay Clark Lopsided solids promise applications in quantum mechanics and medicine Researchers have developed a method to construct solid objects that roll down pre-determined paths, which they reckon could have applications in quantum mechanics and medicine.… This article is an

React to this headline:

Loading spinner

Researchers discover algorithm to create shapes that roll down pre-determined paths Read More »

AgentTesla Malware Targets Users with Malicious Control Panel File

AgentTesla Malware Targets Users with Malicious Control Panel File 09/08/2023 at 22:02 By cybleinc Cyble Research and Intelligence Labs analyzes the distribution method of AgentTesla malware using malicious control panel files. The post AgentTesla Malware Targets Users with Malicious Control Panel File appeared first on Cyble. This article is an excerpt from Cyble View Original

React to this headline:

Loading spinner

AgentTesla Malware Targets Users with Malicious Control Panel File Read More »

Utilization of Leaked Ransomware Builders in Tech-Related Scams

Utilization of Leaked Ransomware Builders in Tech-Related Scams 09/08/2023 at 22:02 By rohansinhacyblecom Key Takeaways This blog sheds light on a new Tech Scam wherein scammers employ deceptive tactics to lure users into paying for non-existent antivirus solutions. Uncovering Tech Scammers possible involvement in different ransomware attacks. The IP address of a domain used in

React to this headline:

Loading spinner

Utilization of Leaked Ransomware Builders in Tech-Related Scams Read More »

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site 09/08/2023 at 22:02 By rohansinhacyblecom   Keylogger and Gh0st RAT Variant deployed to spy on Users   Threat actors (TAs) have been relentlessly employing diverse techniques to propagate malware by leveraging counterfeit websites of renowned applications. Cyble Research and Intelligence Labs (CRIL) reported on a trojanized version

React to this headline:

Loading spinner

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site Read More »

STRRAT’s Latest Version Incorporates Dual Obfuscation Layers

STRRAT’s Latest Version Incorporates Dual Obfuscation Layers 09/08/2023 at 22:02 By rohansinhacyblecom   Key Takeaways   • The blog highlights a new infection technique for distributing STRRAT version 1.6. It involves a spam email with a PDF attachment that, when opened, downloads a zip file containing the malicious JavaScript, which drops STRRAT. • STRRAT version

React to this headline:

Loading spinner

STRRAT’s Latest Version Incorporates Dual Obfuscation Layers Read More »

Rapid7 prepares to toss 18% of workforce to cut costs

Rapid7 prepares to toss 18% of workforce to cut costs 09/08/2023 at 21:03 By Paul Kunert Operating expenses almost as high as actual turnover in latest quarterly numbers Rapid7 is initiating a restructuring process that will involve shedding 18 percent of its workforce after net losses widened over the most recent quarter.… This article is

React to this headline:

Loading spinner

Rapid7 prepares to toss 18% of workforce to cut costs Read More »

White House Offers Prize Money for Hacker-Thwarting AI

White House Offers Prize Money for Hacker-Thwarting AI 09/08/2023 at 21:03 By AFP The White House launched an Artificial Intelligence Cyber Challenge competition for creating new AI systems that can defend critical software from hackers. The post White House Offers Prize Money for Hacker-Thwarting AI appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

White House Offers Prize Money for Hacker-Thwarting AI Read More »

Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files

Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files 09/08/2023 at 21:03 By Eduard Kovacs Critical vulnerabilities discovered in WD and Synology NAS devices could have exposed the files of millions of users. The post Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files Read More »

NetRise unveils SBOM and vulnerability prioritization solutions to enhance XIoT firmware security

NetRise unveils SBOM and vulnerability prioritization solutions to enhance XIoT firmware security 09/08/2023 at 20:01 By Industry News NetRise announced advanced capabilities for maintaining and working with Software Bill of Materials (SBOMs) and support for the CISA’s KEV Catalog for managing and understanding the risks associated with software components in the firmware of connected devices.

React to this headline:

Loading spinner

NetRise unveils SBOM and vulnerability prioritization solutions to enhance XIoT firmware security Read More »

Large-user applications vulnerable to dependency confusion attacks

Large-user applications vulnerable to dependency confusion attacks 09/08/2023 at 19:48 By A OX Security report found applications with more than 1 billion users are using dependencies which are vulnerable to dependency confusion attacks. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Large-user applications vulnerable to dependency confusion attacks Read More »

Gurucul launches Sme AI to improve threat detection and response capabilities

Gurucul launches Sme AI to improve threat detection and response capabilities 09/08/2023 at 19:32 By Industry News Gurucul has launched its new generative AI capability called Sme (Subject Matter Expert) to accelerate threat detection, supercharge security investigations and automate responses. Sme AI empowers Security Operations Center (SOC) analysts with powerful insights into a rich, correlated

React to this headline:

Loading spinner

Gurucul launches Sme AI to improve threat detection and response capabilities Read More »

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs 09/08/2023 at 19:31 By Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. Called Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569), the novel methods follow the disclosure of another newly discovered security vulnerability affecting AMD’s Zen 2 architecture-based

React to this headline:

Loading spinner

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs Read More »

Social media for research and threat intelligence

Social media for research and threat intelligence 09/08/2023 at 19:18 By Learn about threat intelligence on this episode of The Security Podcasts with Igal Lytzki, Incident Response team leader at Perception Point. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Social media for research and threat intelligence Read More »

Dynatrace Security Analytics detects and blocks common application attacks

Dynatrace Security Analytics detects and blocks common application attacks 09/08/2023 at 19:03 By Industry News Dynatrace introduced Security Analytics, a new Dynatrace platform solution designed to help organizations better defend against threats to their hybrid and multicloud environments. Dynatrace Security Analytics leverages Davis AI, which combines predictive and causal AI techniques to provide security analysts

React to this headline:

Loading spinner

Dynatrace Security Analytics detects and blocks common application attacks Read More »

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities 09/08/2023 at 18:32 By Industry News Vicarius launched vuln_GPT, an LLM model trained to generate remediation scripts for software vulnerabilities in the race to find and fix vulnerabilities faster than hackers. The vuln_GPT engine will be freely offered within vsociety, Vicarius’ social community for

React to this headline:

Loading spinner

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities Read More »

Can ‘Mad Libs for incident response’ prevent the next MOVEit?

Can ‘Mad Libs for incident response’ prevent the next MOVEit? 09/08/2023 at 18:17 By Jessica Lyons Hardcastle IBM X-Force lead says yes Black Hat  While MOVEit is just the latest example of a managed file transfer (MFT) tool being exploited by criminals to maximize the amount of data – and money –— they can grab,

React to this headline:

Loading spinner

Can ‘Mad Libs for incident response’ prevent the next MOVEit? Read More »

Scroll to Top