New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data Modern CPUs from Intel, including Raptor Lake and Alder Lake, have been identified susceptible to a novel side-channel attack that might be used to …
South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware An undisclosed South Korean enterprise resource planning (ERP) vendor's product update server has been discovered to be exploited to deploy a Go…
Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks Cybersecurity experts have found an attack operation that targets several Israeli businesses utilizing publicly-available frameworks like Donut and …
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks The loader-as-a-service (LaaS) known as FakeBat has become one of the most popular loader malware families delivered via the drive-by download tacti…
Microsoft MSHTML Flaw Exploited to Deliver MerkSpy Spyware Tool Unknown threat actors have been seen using a now-patched security hole in Microsoft MSHTML to distribute a spying tool called MerkSpy as part of a c…
The Emerging Role of AI in Open-Source Intelligence Recently the Office of the Director of National Intelligence (ODNI) released a new strategy for open-source intelligence (OSINT) and referred to OSI…
Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike A concerted law enforcement operation dubbed MORPHEUS has toppled up to 600 servers that were utilized by cybercriminal gangs and were part of an at…
Brazil Halts Meta's AI Data Processing Amid Privacy Concerns Brazil's data protection watchdog, Autoridade Nacional de Proteção de Dados (ANPD), has temporarily barred Meta from processing users' perso…
End-to-End Secrets Security: Making a Plan to Secure Your Machine Identities At the heart of every application are secrets. Credentials that allow human-to-machine and machine-to-machine communication. Machine identities outn…