• Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

    Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

    Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to target MLOps platforms. These vulnerabilities, which are described as inherent- and implementation-based flaws, could have severe consequences, ranging from arbitrary code execution to loading

    Read More

  • Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

    Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

    Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case in point: Disney suffered a devastating data leak by a hacktivist group known as NullBulge that got hold of over 1.2 terabytes of data…

    Read More

  • Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

    Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

    Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.ai

    Read More

  • Telegram Founder Pavel Durov Arrested in France for Content Moderation Failures

    Telegram Founder Pavel Durov Arrested in France for Content Moderation Failures

    Pavel Durov, founder and chief executive of the popular messaging app Telegram, was arrested in France on Saturday, according to French television network TF1. Durov is believed to have been apprehended pursuant to a warrant issued in connection with a preliminary police investigation. TF1 said the probe was focused on a lack of content moderation…

    Read More

  • New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules

    New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules

    Cybersecurity researchers have uncovered a new stealthy piece of Linux malware that leverages an unconventional technique to achieve persistence on infected systems and hide credit card skimmer code. The malware, attributed to a financially motivated threat actor, has been codenamed sedexp by Aon’s Stroz Friedberg incident response services team. “This advanced threat, active since 2022,…

    Read More

  • CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

    CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. The medium-severity vulnerability, tracked as CVE-2024-39717 (CVSS score: 6.6), is case of file upload bug impacting the “Change Favicon” feature that could allow a threat actor…

    Read More

  • Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp

    Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp

    Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian state-sponsored threat actor, who it said used a set of WhatsApp accounts that attempted to target individuals in Israel, Palestine, Iran, the U.K., and the U.S. The activity cluster, which originated from Iran, “appeared to…

    Read More

  • New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads

    New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads

    Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems with information stealers and loaders. “This memory-only dropper decrypts and executes a PowerShell-based downloader,” Google-owned Mandiant said. “This PowerShell-based downloader is being tracked as PEAKLIGHT.” Some of

    Read More

  • Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform

    Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform

    Let’s be honest. The world of cybersecurity feels like a constant war zone. You’re bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It’s exhausting, isn’t it? But what if there was a better way? Imagine having every essential cybersecurity tool at your fingertips, all within a…

    Read More

  • Focus on What Matters Most: Exposure Management and Your Attack Surface

    Focus on What Matters Most: Exposure Management and Your Attack Surface

    Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s on-demand webinar. To learn more about reducing your attack surface, reach out to their team today.  Attack surface management vs exposure management Attack surface management (ASM) is…

    Read More