April 23, 2024PressroomSupply chain attack/application security Researchers have identified a dependency confusion vulnerability affecting an archived Apache project called Wiring the Cordova app. Dependency confusion attacks occur because package managers…
Category: Cyber Security
US government slaps visa restrictions on spyware exponents
The US State Department is imposing visa restrictions on 13 people involved in the development and sale of commercial spyware, as well as their spouses and children. “These individuals facilitated…
Police chiefs are calling for solutions to access encrypted data in serious crime cases
April 23, 2024PressroomEnd-to-end encryption/privacy European police chiefs have said the complementary partnership between law enforcement and the tech industry is at risk due to end-to-end encryption (E2EE). They called on…
Lessons for CISOs from OWASP’s Top 10 LLMs
COMMENT OWASP recently released its top 10 list for Large Language Model (LLM) applications., in an effort to educate the industry on potential security threats to be aware of when…
Learn proactive supply chain threat hunting techniques
April 23, 2024News about hackersThreat Hunting/Software Security In the high-risk world of cybersecurity, the battlefield has changed. Supply chain attacks have emerged as a potent threat, exploiting the intricate web…
VPNs and non-existent firewall telemetry attract APTs
Earlier this year, Mandiant Consulting’s incident response team traced an attack by a China-linked spy group to the compromise of an edge device in its client’s network, but because the…
Exposing the true cost of cyber attacks: Beyond ransom and recovery
Cybersecurity breaches can be devastating for both individuals and businesses. While many people tend to focus on understanding how and why they were targeted by such breaches, there is a…
The United States imposes visa restrictions on 13 people linked to the misuse of commercial spyware
April 23, 2024PressroomSpyware/cyber espionage The U.S. State Department said Monday that it is taking steps to impose visa restrictions on 13 people allegedly involved in developing and selling commercial spyware…
APT28 in Russia exploited Windows print spooler flaw to spread “GooseEgg” malware
April 23, 2024PressroomNational Security Agency/Threat Intelligence The perpetrator of the Russia-linked state threat has been identified APT28 weaponized a security flaw in the Print Spooler component of Microsoft Windows to…
63% of organizations implement globally
According to the latest research from Gartner Inc., 63% of organizations globally have implemented a Zero Trust strategy in their operations, whether partial or total. More than half (56%) of…