Silk Typhoon Hackers Indicted

Lots of interesting details in the story: The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the ...

CISA Under Trump

Jen Easterly is out as the Director of CISA. Read her final interview: There’s a lot of unfinished business. We have made an impact through our ransomware vulnerability warning pilot and our ...
OAuth Identity Attack — Are your Extensions Affected?

OAuth Identity Attack — Are your Extensions Affected?

OAuth Identity Attack — Are your Extensions Affected?A malicious variant of Cyberhaven’s browser extension (v24.10.4) was uploaded to the Chrome Store on Christmas Day. According to Cyberhaven, this compromised version can allow “sensitive information, ...

Race Condition Attacks against LLMs

These are two attacks against the system components surrounding LLMs: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on the growing list of LLM attack types ...
Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits

Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits

Zero-day vulnerabilities remain a significant threat to cybersecurity, particularly for enterprise environments. One of the latest and most concerning examples is CVE-2024-38213, nicknamed "Copy2Pwn." This vulnerability allows attackers to bypass the Windows ...
Iran Israel cyberattack internet Wi-Fi

Iranian Internet Attacked by Israeli Hacktivist Group: Reports

Israeli hacktivist group WeRedEvils reportedly attacked Iran's Wi-Fi infrastructure, knocking out internet service in parts of the country amid growing tensions following Israel's assassination this week of a Hamas leader in Iran ...
Security Boulevard
Identity crisis? Manageable. Identity attacks? Crisis!

Identity crisis? Manageable. Identity attacks? Crisis!

Don’t let your employees fall prey to identity attacksIn the early internet days, logging in meant entering a username and password. If the password matched what the server had stored, you got in ...

Using LLMs to Exploit Vulnerabilities

Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.” Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world ...
Silhouette of businesswoman against black wall with key hole

Cyberattack Risks Keep Small Business Security Teams on Edge

Three-quarters of SMBs fear that a cyberattack could put them out of business. For good reason: 96% of them have already been the victims of a cyberattack ...
Security Boulevard
secure, remote, point-of-sale. systems, PCI DSS, third-party, businessmman with a credit card and computer

Christie’s Auction House Hacked, Sensitive Data from 500,000 Customers Stolen

A hacker group claims to have stolen sensitive data from at least 500,000 Christie's customers. Now they are threatening to publish it ...
Security Boulevard