Featured

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed!

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! 2024-04-02 at 14:16 By Kevin Townsend Heartbleed made most certificates vulnerable. The future problem is that quantum decryption will make all certificates and everything else using RSA encryption vulnerable to everyone. The post Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! appeared first […]

React to this headline:

Loading spinner

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! Read More »

Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor

Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor 2024-04-01 at 17:16 By Ionut Arghire Urgent security alerts issued as malicious code was found embedded in the XZ Utils data compression library used in many Linux distributions. The post Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor appeared first on

React to this headline:

Loading spinner

Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor Read More »

AT&T Says Data on 73 Million Customers Leaked on Dark Web

AT&T Says Data on 73 Million Customers Leaked on Dark Web 2024-03-31 at 06:16 By Mike Lennon AT&T used the Easter holiday weekend to quietly share details on data that surfaced on the dark web roughly two weeks ago. The post AT&T Says Data on 73 Million Customers Leaked on Dark Web appeared first on

React to this headline:

Loading spinner

AT&T Says Data on 73 Million Customers Leaked on Dark Web Read More »

The Complexity and Need to Manage Mental Well-Being in the Security Team

The Complexity and Need to Manage Mental Well-Being in the Security Team 2024-03-29 at 14:46 By Kevin Townsend It is the CISO’s responsibility to build and maintain a high functioning team in a difficult environment – cybersecurity is a complex, continuous, and adversarial environment like none other outside of military conflict. The post The Complexity

React to this headline:

Loading spinner

The Complexity and Need to Manage Mental Well-Being in the Security Team Read More »

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters 2024-03-27 at 15:01 By Ionut Arghire Disputed Ray AI framework vulnerability exploited to steal information and deploy cryptominers on hundreds of clusters. The post Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters Read More »

ZenHammer Attack Targets DRAM on Systems With AMD CPUs

ZenHammer Attack Targets DRAM on Systems With AMD CPUs 2024-03-26 at 17:01 By Eduard Kovacs A new Rowhammer attack named ZenHammer has been demonstrated against DRAM on systems with AMD CPUs, including DDR5. The post ZenHammer Attack Targets DRAM on Systems With AMD CPUs appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

ZenHammer Attack Targets DRAM on Systems With AMD CPUs Read More »

Recent Fortinet FortiClient EMS Vulnerability Exploited in Attacks

Recent Fortinet FortiClient EMS Vulnerability Exploited in Attacks 2024-03-26 at 12:46 By Eduard Kovacs CVE-2023-48788, a critical SQL injection vulnerability in Fortinet’s FortiClient EMS product, is being exploited in the wild. The post Recent Fortinet FortiClient EMS Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Recent Fortinet FortiClient EMS Vulnerability Exploited in Attacks Read More »

New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys 

New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys  2024-03-22 at 14:01 By Eduard Kovacs Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys. The post New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys  Read More »

$200,000 Awarded at Pwn2Own 2024 for Tesla Hack

$200,000 Awarded at Pwn2Own 2024 for Tesla Hack 2024-03-21 at 11:46 By Eduard Kovacs Participants earned a total of $732,500 on the first day of Pwn2Own Vancouver 2024 for hacking a Tesla, operating systems, and other software. The post $200,000 Awarded at Pwn2Own 2024 for Tesla Hack appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

$200,000 Awarded at Pwn2Own 2024 for Tesla Hack Read More »

300,000 Systems Vulnerable to New Loop DoS Attack

300,000 Systems Vulnerable to New Loop DoS Attack 2024-03-20 at 12:01 By Eduard Kovacs Academic researchers describe a new application-layer loop DoS attack affecting Broadcom, Honeywell, Microsoft and MikroTik. The post 300,000 Systems Vulnerable to New Loop DoS Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

300,000 Systems Vulnerable to New Loop DoS Attack Read More »

New Attack Shows Risks of Browsers Giving Websites Access to GPU 

New Attack Shows Risks of Browsers Giving Websites Access to GPU  2024-03-18 at 15:17 By Eduard Kovacs Researchers demonstrate remote GPU cache side-channel attack from within browsers against AMD and NVIDIA graphics cards. The post New Attack Shows Risks of Browsers Giving Websites Access to GPU  appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New Attack Shows Risks of Browsers Giving Websites Access to GPU  Read More »

IMF Emails Hacked

IMF Emails Hacked 2024-03-18 at 10:28 By Eduard Kovacs The International Monetary Fund (IMF) detects a cybersecurity incident that involved nearly a dozen email accounts getting hacked. The post IMF Emails Hacked appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

IMF Emails Hacked Read More »

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

Cyber Madness Bracket Challenge – Register to Play

Cyber Madness Bracket Challenge – Register to Play 2024-03-14 at 14:01 By Mike Lennon SecurityWeek’s Cyber Madness Bracket Challenge is a contest designed to bring the community together in a fun, competitive way through one of America’s top sporting events. The post Cyber Madness Bracket Challenge – Register to Play appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Cyber Madness Bracket Challenge – Register to Play Read More »

Major CPU, Software Vendors Impacted by New GhostRace Attack

Major CPU, Software Vendors Impacted by New GhostRace Attack 2024-03-13 at 12:33 By Eduard Kovacs CPU makers Intel, AMD, Arm and IBM, as well as software vendors, are impacted by a new speculative race condition (SRC) attack named GhostRace. The post Major CPU, Software Vendors Impacted by New GhostRace Attack appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Major CPU, Software Vendors Impacted by New GhostRace Attack Read More »

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure 2024-03-12 at 13:18 By Eduard Kovacs Vulnerabilities affecting a Nice Linear physical access product, including an exploited flaw, patched five years after their disclosure. The post Exploited Building Access System Vulnerability Patched 5 Years After Disclosure appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure Read More »

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure 2024-03-07 at 13:36 By Eduard Kovacs Critical TeamCity authentication bypass vulnerability CVE-2024-27198 exploited in the wild after details were disclosed. The post Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure Read More »

CrowdStrike to Acquire Flow Security

CrowdStrike to Acquire Flow Security 2024-03-06 at 05:03 By SecurityWeek News CrowdStrike says the acquisition of Flow Security will expand its cloud security capabilities with Data Security Posture Management. The post CrowdStrike to Acquire Flow Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

CrowdStrike to Acquire Flow Security Read More »

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking 2024-03-05 at 14:02 By Eduard Kovacs Vulnerabilities in a plugin for the Zeek network security monitoring tool can be exploited in attacks aimed at ICS environments. The post Zeek Security Tool Vulnerabilities Allow ICS Network Hacking appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking Read More »

Scroll to Top