The popular Rust Crate liblzma-sys was compromised by XZ Utils backdoor files

“Test files” associated with the XZ Utils backdoor have made their way into a Rust chest known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded more…

Knostic brings access control to LLMs

Security startup Knostic is the latest company face different challenges that organizations face when adopting generative AI tools. Knostic emerged stealthily with $3.3 million in pre-seed funding to introduce “necessary”…

Palo Alto Networks critical PAN-OS flaw under active attack

April 12, 2024PressroomNetwork security/Zero-day Palo Alto Networks warns that a critical flaw affecting the PAN-OS software used in its GlobalProtect gateways is being actively exploited in the wild. Tracked as…

Observations from the front line

COMMENT Recent Volt Typhoon headlinesA Chinese state-sponsored actor targeting US critical infrastructure has raised alarm over the attacker’s dwell time and dwell time. security of critical infrastructures under the spotlight.…

Keepers of the Code: Mastering Nonhuman Identity Management

April 12, 2024News about hackersDevSecOps/Identity Management Identities now transcend human boundaries. Inside every line of code and every API call lies a non-human identity. These entities act as programmatic access…

Iranian MuddyWater Hackers Adopt New C2 Tool “DarkBeatC2” in Latest Campaign

The Iranian actor known as MuddyWater has been attributed to a new command and control (C2) infrastructure called DarkBeatC2becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2…

Tips for protecting your software supply chain

Software supply chain attacks are relatively easy to conduct and have significant payoff for attackers, so it’s no wonder why they are a top priority for CISOs. “This is especially…

US federal agencies have been ordered to look for signs of Microsoft breaches and mitigate risks

April 12, 2024PressroomCyber ​​attack/data breach The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive (ED 24-02) on Thursday calling on federal agencies to look for signs of…

Apple warns users targeted by mercenary spyware

Apple this week updated its spyware threat notification system to alert and assist users identified as being targeted mercenary spyware attacks. To date, Apple has identified and notified users in…

Sneaky credit card skimmer disguised as a harmless Facebook tracker

April 12, 2024PressroomWeb/WordPress Security Cybersecurity researchers have discovered a credit card skimmer hidden inside a fake Meta Pixel tracking script in an attempt to evade detection. Sucuri said the malware…