• Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

    Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

    Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized. With high-value assets, it’s not good enough to…

    Read More

  • Preliminary results for Aug. 6 Primary

    Preliminary results for Aug. 6 Primary

    Read More

  • FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

    FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

    The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor (aka Radar). The effort saw the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Dispossessor is said to be…

    Read More

  • Ukraine Warns of New Phishing Campaign Targeting Government Computers

    Ukraine Warns of New Phishing Campaign Targeting Government Computers

    The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security Service of Ukraine to distribute malware capable of remote desktop access. The agency is tracking the activity under the name UAC-0198. More than 100 computers are estimated to have been infected since July 2024, including…

    Read More

  • How Phishing Attacks Adapt Quickly to Capitalize on Current Events

    How Phishing Attacks Adapt Quickly to Capitalize on Current Events

    In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year, according to research from Egress. What’s behind the surge in phishing? One popular answer is AI – particularly generative AI, which has made it trivially easier for threat actors to craft content…

    Read More

  • Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

    Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

    Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and Deye that could enable malicious actors to cause disruption and power blackouts. “If exploited, these vulnerabilities could allow an attacker to control inverter settings that could take parts of the grid down, potentially causing

    Read More

  • The AI Hangover is Here – The End of the Beginning

    The AI Hangover is Here – The End of the Beginning

    After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the market corrects the share price of the major players (like Nvidia, Microsoft, and Google), while other players reassess the market and adjust priorities. Gartner calls it the trough of disillusionment, when interest wanes and implementations…

    Read More

  • FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

    FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

    The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges. The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity. “A signal handler in sshd(8)…

    Read More

  • Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

    Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

    Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks. The elevated access could then be weaponized to decrypt encrypted firmware files and encrypted data such as passwords in configuration files, and even get correctly signed X.509…

    Read More

  • Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

    Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

    Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to steal victims’ secrets. “The legitimate Solana Python API project is known as ‘solana-py’ on GitHub, but simply ‘solana’ on the Python software registry, PyPI,” Sonatype…

    Read More