The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East.…
Category: Cyber Security
Google sues app developers for scamming fake cryptocurrency investing apps
08 April 2024PressroomInvestment scam/mobile security Google has filed a lawsuit against two app developers for engaging in an “international online consumer investment fraud scheme” that tricked users into downloading fake…
Hackers exploit Magento bug to steal payment data from e-commerce sites
06 April 2024PressroomSkimmer/Threat Intelligence Threat actors have been discovered to exploit a critical flaw in Magento to insert a persistent backdoor into e-commerce sites. The attack has leverage CVE-2024-20720 (CVSS…
How do we integrate LLM security into application development?
Question: What do we really know about Large Language Model (LLM) security? And are we willingly opening the gateway to chaos by using LLMs in business? Rob Gurzeev, CEO of…
Critical Bugs Put Hugging Face AI Platform in a ‘Pickle’
Two critical vulnerabilities in the security of the Hugging Face AI platform have opened the door to attackers seeking to access and alter customer data and models. One of the…
Panera Bread fuels ransomware suspicions with silence
Panera Bread customers and employees reported experiencing outages in the restaurant chain’s ordering system, mobile apps, loyalty programs and more on March 22. Although the IT outage slowed operations for…
Researchers identify several Chinese hacker groups exploiting Ivanti security flaws
05 April 2024PressroomAdvanced persistent threat Multiple Chinese threat actors have been linked to zero-day exploitation of three security flaws affecting Ivanti equipment (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are tracked…
Magecart attackers are pioneers of persistent e-commerce backdoor
Magecart attackers have a new trick: They hide persistent backdoors within e-commerce sites that can automatically push malware. Second Sansec researchersThreat actors are exploiting a critical command injection vulnerability in…
AI-as-a-Service providers vulnerable to PrivEsc and cross-tenant attacks
05 April 2024PressroomArtificial Intelligence/Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers like Hugging Face are susceptible to two critical risks that could allow threat actors to…
The White House’s call for memory security comes with challenges, changes and costs
COMMENT The recent publication”Let’s go back to building bricks: A Path Toward Secure and Measurable Software” from the White House Office of the National Cyber Director (ONCD) provides additional details…