Apache Cordova app wiring targeted in dependency confusion attack

April 23, 2024PressroomSupply chain attack/application security Researchers have identified a dependency confusion vulnerability affecting an archived Apache project called Wiring the Cordova app. Dependency confusion attacks occur because package managers…

US government slaps visa restrictions on spyware exponents

The US State Department is imposing visa restrictions on 13 people involved in the development and sale of commercial spyware, as well as their spouses and children. “These individuals facilitated…

Police chiefs are calling for solutions to access encrypted data in serious crime cases

April 23, 2024PressroomEnd-to-end encryption/privacy European police chiefs have said the complementary partnership between law enforcement and the tech industry is at risk due to end-to-end encryption (E2EE). They called on…

Lessons for CISOs from OWASP’s Top 10 LLMs

COMMENT OWASP recently released its top 10 list for Large Language Model (LLM) applications., in an effort to educate the industry on potential security threats to be aware of when…

Learn proactive supply chain threat hunting techniques

April 23, 2024News about hackersThreat Hunting/Software Security In the high-risk world of cybersecurity, the battlefield has changed. Supply chain attacks have emerged as a potent threat, exploiting the intricate web…

VPNs and non-existent firewall telemetry attract APTs

Earlier this year, Mandiant Consulting’s incident response team traced an attack by a China-linked spy group to the compromise of an edge device in its client’s network, but because the…

Exposing the true cost of cyber attacks: Beyond ransom and recovery

Cybersecurity breaches can be devastating for both individuals and businesses. While many people tend to focus on understanding how and why they were targeted by such breaches, there is a…

The United States imposes visa restrictions on 13 people linked to the misuse of commercial spyware

April 23, 2024PressroomSpyware/cyber espionage The U.S. State Department said Monday that it is taking steps to impose visa restrictions on 13 people allegedly involved in developing and selling commercial spyware…

APT28 in Russia exploited Windows print spooler flaw to spread “GooseEgg” malware

April 23, 2024PressroomNational Security Agency/Threat Intelligence The perpetrator of the Russia-linked state threat has been identified APT28 weaponized a security flaw in the Print Spooler component of Microsoft Windows to…

63% of organizations implement globally

According to the latest research from Gartner Inc., 63% of organizations globally have implemented a Zero Trust strategy in their operations, whether partial or total. More than half (56%) of…