Content Paint

Security

UPDATED: File transfer software under active attack. Banks, gov't hit as CVE, new IOCs released

Admins should urgently modify firewall rules to deny HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443. (Also, can we start fuzzing for SQL Injection properly, please?)

kaspersky iphones hacked iphone zero day

Apple: "We have never worked with any government to insert a backdoor into any Apple product and never will..."

John Scimone had one hell of an introducton to life as a CISO...

Barracuda tells customers to dump infected email security appliances after breach

Customers were first hit in October 2022. End user telemetry flagged something remiss this month... IOCs and Yara rules now shared.

Millions of Gigabyte motherboards appear to be backdoored

“I know how I would do this intentionally and it would look exactly like this. You literally are downloading something from the internet and running it with the highest privileges on the system. It's easy to say 'oops! I didn't know..."

Chinese state-backed hackers Typhoon Volt targeted US critical infrastructure

The group is intent on developing capabilities and access that “could disrupt critical communications infrastructure between the United States and Asia region during future crises.” Threat vector Fortinet has questions to answer ...

PyPI malicious project uploads force shutdown

An uptick in malicious new projects being created on the Python Package Index (PyPI) repository forced it to shut down new user registrations over the weekend in a worrying sign for the open source project. PyPI is a repository of open-source Python packages supplied by the worldwide community of Python

micron china security

Beijing claimed Sunday that it had found security issues in semiconductor firm Micron products that “pose a major security risk" to China

Why security pros are seething over Google’s new .zip domains

Google this week launched a new Top Level Domain of .zip and it has cybersecurity professionals worried. Here’s why. The way that modern browsers treat URLs – considering everything after @ as the host name, rather than the “user information” before it –  means that it is easy to create a convincing

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.