“The strangest trend in cybersecurity”: Nation-states return to USBs

Nationwide cyber threat groups are once again turning to USBs to compromise highly protected government organizations and critical infrastructure facilities. Having fallen out of fashion for some time now, and…

Don’t give your business data to AI companies

COMMENT Artificial intelligence (AI) is challenging our pre-existing ideas about what is possible with technology. The transformative potential of AI could disrupt a variety of different tasks and business scenarios…

How CISA fights cyber threats during primary election season

After the integrity and security of the US elections took center stage following the 2020 presidential race, the Cybersecurity and Infrastructure Security Agency (CISA) is doing everything it can to…

Chinese state hackers target Tibetans with supply chain and Watering Hole attacks

07 March 2024PressroomCyber ​​espionage/software security The China-linked menacing actor known as Evasive panda has orchestrated both wateringhole and supply chain attacks against Tibetan users since at least September 2023. The…

Linux variants of the Bifrost Trojan evade detection via typosquatting

A 20-year-old Trojan recently resurfaced with new variants that target Linux and impersonate a trusted hosted domain to evade detection. Palo Alto Networks researchers have identified a new Linux variant…

Compromised WordPress sites that abuse visitors’ browsers for distributed brute force attacks

07 March 2024PressroomVulnerabilities/Web security Threat actors are conducting brute force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form…

The security challenges of AI begin with its definition

As artificial intelligence (AI) continues to attract everyone’s attention, AI safety has become a popular topic in the marketplace of ideas. AI security is capturing the media cycle, AI security…

Human and non-human identity in SaaS

In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security management and requires rigorous governance of user…

China-Linked Cyber ​​Spies Conflate Watering Hole and Supply Chain Attacks

A targeted cyber attack linked to a Chinese threat group has infected visitors to a Buddhist festival website and users of a Tibetan language translation application. According to new research…

Former Google engineer arrested for stealing AI technology secrets for China

The United States Department of Justice (DoJ) announced the indictment of a 38-year-old Chinese national living in California for allegedly stealing proprietary information from Google while secretly working for two…