March 14, 2024PressroomMalware/Cyber Attacks A DarkGate malware campaign observed in mid-January 2024 exploited a recently patched security flaw in Microsoft Windows as a zero-day using bogus software installers. “During this…
Category: Cyber Security
Over 150,000 network devices and apps in the UAE exposed online
The United Arab Emirates (UAE)’s rapid adoption of IT and operational technology (OT) has significantly increased their attack surface, with nearly 155,000 remotely accessible assets recently discovered and left vulnerable…
Codezero raises $3.5 million in seed funding from ballistics ventures to secure multicloud application development
PRESS RELEASE VANCOUVER, BC, March 12, 2024/PRNewswire/ — Codezero, the innovator in developing secure enterprise microservices, today announced a $3.5 million seed funding round led by Ballistic Ventures, the venture…
63% of known exploited vulnerabilities tracked by CISA are found in healthcare organizations’ networks
PRESS RELEASE NEW YORK and ORLANDO, Florida, March 12, 2024/PRNewswire/ —ClarotyThe cyber-physical systems (CPS) security company released a new report today at its annual HIMSS24 conference that revealed data regarding…
ChatGPT Reveals Secrets in New PoC Attack
A team of researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack to extract key architectural information from proprietary…
Cybercriminals deploying VCURMS and STRRAT trojans via AWS and GitHub
March 13, 2024PressroomPhishing attacks/threat intelligence A new phishing campaign has been observed distributing remote access trojans (RATs) such as VCURMS and STRRAT via a malicious Java-based downloader. “Attackers have stored…
What is the best solution for the 10 common Infosec tasks?
At the end of 2023, I wrote an article comparing how well ChatGPT and Google Bard handle writing security policies. Given that ChatGPT 4.0 has been available as a paid…
Researchers highlight the susceptibility of Google’s Gemini AI to LLM threats
March 13, 2024PressroomLarge language model/AI security Google’s Gemini Large Language Model (LLM) is susceptible to security threats that could cause it to leak system instructions, generate malicious content, and perform…
The Kubernetes RCE flaw allows full control of Windows nodes
A security bug in the popular Kubernetes container management system allows attackers to remotely execute code with system privileges on Windows endpoints, potentially leading to the complete takeover of all…
Debunking a common myth about cybersecurity
March 13, 2024News about hackersApp security/cyber security One of the most common misconceptions in file upload cybersecurity is that some tools are “sufficient” on their own – this is simply…