BadSpace Windows Backdoor
17
Jun
2024

Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor

Jun 17, 2024NewsroomWeb Security / Malware Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed…

Critical ASUS Router Flaw Attacker Executes Arbitrary Commands
17
Jun
2024

Critical ASUS Router Flaw Attacker Executes Arbitrary Commands

A critical vulnerability has been discovered in several models of ASUS routers. It allows unauthenticated remote attackers to execute arbitrary…

FBI Arrested U.K. Hacker Link to Scattered Spider Hacking Group
17
Jun
2024

FBI Arrested U.K. Hacker Link to Scattered Spider Hacking Group

A 22-year-old British man was apprehended by authorities in Palma de Mallorca, Spain. The arrest, carried out by the United…

Naveen Goud
17
Jun
2024

How cars can pose a cyber threat to user privacy

In today’s interconnected world, the advent of smart cars has brought convenience and innovation to the automotive industry. However, with…

Ghidra: Open-source software reverse engineering framework
17
Jun
2024

Ghidra: Open-source software reverse engineering framework

Ghidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directorate….

NiceRAT Malware
17
Jun
2024

NiceRAT Malware Targets South Korean Users via Cracked Software

Jun 17, 2024NewsroomBotnet / Cryptocurrency Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into…

Low code, high stakes: Addressing SQL injection
17
Jun
2024

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s….

The rise of SaaS security teams
17
Jun
2024

The rise of SaaS security teams

In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge…

Malicious emails trick consumers into false election contributions
17
Jun
2024

Malicious emails trick consumers into false election contributions

Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove…

ARM CPU
17
Jun
2024

New ARM ‘TIKTAG’ attack impacts Google Chrome, Linux systems

A new speculative execution attack named “TIKTAG” targets ARM’s Memory Tagging Extension (MTE) to leak data with over a 95% chance…

AI isn’t coming for your job, but it might be coming for your Intellectual Property
17
Jun
2024

AI isn’t coming for your job, but it might be coming for your Intellectual Property – Promoted Content

Generative AI (GenAI) has become a transformative technology for enterprise businesses in more ways than one. Its widespread adoption will…

National Anti Scam Centre joins industry intel loop
17
Jun
2024

National Anti Scam Centre joins industry intel loop – Security

The government’s National Anti Scam Centre has joined an intelligence exchange in a move that should improve industry visibility of…