DarkGate malware exploits recently patched the Microsoft flaw in the Zero-Day attack

March 14, 2024PressroomMalware/Cyber ​​Attacks A DarkGate malware campaign observed in mid-January 2024 exploited a recently patched security flaw in Microsoft Windows as a zero-day using bogus software installers. “During this…

Over 150,000 network devices and apps in the UAE exposed online

The United Arab Emirates (UAE)’s rapid adoption of IT and operational technology (OT) has significantly increased their attack surface, with nearly 155,000 remotely accessible assets recently discovered and left vulnerable…

Codezero raises $3.5 million in seed funding from ballistics ventures to secure multicloud application development

PRESS RELEASE VANCOUVER, BC, March 12, 2024/PRNewswire/ — Codezero, the innovator in developing secure enterprise microservices, today announced a $3.5 million seed funding round led by Ballistic Ventures, the venture…

63% of known exploited vulnerabilities tracked by CISA are found in healthcare organizations’ networks

PRESS RELEASE NEW YORK and ORLANDO, Florida, March 12, 2024/PRNewswire/ —ClarotyThe cyber-physical systems (CPS) security company released a new report today at its annual HIMSS24 conference that revealed data regarding…

ChatGPT Reveals Secrets in New PoC Attack

A team of researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack to extract key architectural information from proprietary…

Cybercriminals deploying VCURMS and STRRAT trojans via AWS and GitHub

March 13, 2024PressroomPhishing attacks/threat intelligence A new phishing campaign has been observed distributing remote access trojans (RATs) such as VCURMS and STRRAT via a malicious Java-based downloader. “Attackers have stored…

What is the best solution for the 10 common Infosec tasks?

At the end of 2023, I wrote an article comparing how well ChatGPT and Google Bard handle writing security policies. Given that ChatGPT 4.0 has been available as a paid…

Researchers highlight the susceptibility of Google’s Gemini AI to LLM threats

March 13, 2024PressroomLarge language model/AI security Google’s Gemini Large Language Model (LLM) is susceptible to security threats that could cause it to leak system instructions, generate malicious content, and perform…

The Kubernetes RCE flaw allows full control of Windows nodes

A security bug in the popular Kubernetes container management system allows attackers to remotely execute code with system privileges on Windows endpoints, potentially leading to the complete takeover of all…

Debunking a common myth about cybersecurity

March 13, 2024News about hackersApp security/cyber security One of the most common misconceptions in file upload cybersecurity is that some tools are “sufficient” on their own – this is simply…