• CTEM in the Spotlight: How Gartner’s New Categories Help to Manage Exposures

    CTEM in the Spotlight: How Gartner’s New Categories Help to Manage Exposures

    Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations report takes important steps to organize and mature the domain of Continuous Threat Exposure Management, aka CTEM. Three categories within this domain are included in this year’s report: Threat Exposure Management, Exposure Assessment Platforms (EAP),…

    Read More

  • Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

    Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

    Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. “ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface,” security researcher Johann Rehberger said. “This…

    Read More

  • Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

    Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

    Google has revealed that a security flaw that was patched as part of a software update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine. “Inappropriate implementation in…

    Read More

  • Preliminary results for Aug. 6 Primary

    Preliminary results for Aug. 6 Primary

    Read More

  • Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

    Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

    A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and extradition of a Belarussian and Ukrainian dual-national believed to be associated with Russian-speaking cybercrime groups. Maksim Silnikau (aka Maksym Silnikov), 38, went by the online monikers J.P. Morgan, xxx, and lansky. He was extradited to…

    Read More

  • How to Augment Your Password Security with EASM

    How to Augment Your Password Security with EASM

    Simply relying on traditional password security measures is no longer sufficient. When it comes to protecting your organization from credential-based attacks, it is essential to lock down the basics first. Securing your Active Directory should be a priority – it is like making sure a house has a locked front door before investing in a…

    Read More

  • DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals

    DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals

    Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of 2024 provides detailed insights into DDoS attack data, showcasing changes in attack patterns and the broader landscape of cyber threats. Here, we share a selection of findings from the full report. Key…

    Read More

  • Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Days

    Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Days

    Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have come under active exploitation in the wild. Of the 90 bugs, nine are rated Critical, 80 are rated Important, and one is rated Moderate in severity. This is also in addition to 36 vulnerabilities that…

    Read More

  • Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

    Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

    Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to achieve an authentication bypass and create rogue administrative users. The vulnerability, tracked as CVE-2024-7593, has a CVSS score of 9.8 out of a maximum of 10.0. “Incorrect implementation of an authentication algorithm in Ivanti vTM…

    Read More

  • GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

    GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

    A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head’s XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices. The vulnerability has been codenamed GhostWrite. It has been described as a direct CPU…

    Read More