“Test files” associated with the XZ Utils backdoor have made their way into a Rust chest known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded more…
Category: Cyber Security
Knostic brings access control to LLMs
Security startup Knostic is the latest company face different challenges that organizations face when adopting generative AI tools. Knostic emerged stealthily with $3.3 million in pre-seed funding to introduce “necessary”…
Palo Alto Networks critical PAN-OS flaw under active attack
April 12, 2024PressroomNetwork security/Zero-day Palo Alto Networks warns that a critical flaw affecting the PAN-OS software used in its GlobalProtect gateways is being actively exploited in the wild. Tracked as…
Observations from the front line
COMMENT Recent Volt Typhoon headlinesA Chinese state-sponsored actor targeting US critical infrastructure has raised alarm over the attacker’s dwell time and dwell time. security of critical infrastructures under the spotlight.…
Keepers of the Code: Mastering Nonhuman Identity Management
April 12, 2024News about hackersDevSecOps/Identity Management Identities now transcend human boundaries. Inside every line of code and every API call lies a non-human identity. These entities act as programmatic access…
Iranian MuddyWater Hackers Adopt New C2 Tool “DarkBeatC2” in Latest Campaign
The Iranian actor known as MuddyWater has been attributed to a new command and control (C2) infrastructure called DarkBeatC2becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2…
Tips for protecting your software supply chain
Software supply chain attacks are relatively easy to conduct and have significant payoff for attackers, so it’s no wonder why they are a top priority for CISOs. “This is especially…
US federal agencies have been ordered to look for signs of Microsoft breaches and mitigate risks
April 12, 2024PressroomCyber attack/data breach The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive (ED 24-02) on Thursday calling on federal agencies to look for signs of…
Apple warns users targeted by mercenary spyware
Apple this week updated its spyware threat notification system to alert and assist users identified as being targeted mercenary spyware attacks. To date, Apple has identified and notified users in…
Sneaky credit card skimmer disguised as a harmless Facebook tracker
April 12, 2024PressroomWeb/WordPress Security Cybersecurity researchers have discovered a credit card skimmer hidden inside a fake Meta Pixel tracking script in an attempt to evade detection. Sucuri said the malware…