Category: EN

Defenders Outpace Attackers in AI Adoption

Trend Micro’s Robert McArdle says cybercriminals use of AI is far more limited than many realize, and pales in comparison to defenders’ use of the technology This article has been indexed from www.infosecurity-magazine.com Read the original article: Defenders Outpace Attackers…

Steam Account Checker Poisoned with Infostealer, (Thu, Nov 7th)

I found an interesting script targeting Steam users. Steam[1] is a popular digital distribution platform for purchasing, downloading, and playing video games on personal computers. The script is called “steam-account-checker” and is available in Github[2]. Its description is: This article…

PRODUCT REVIEW: TXONE NETWORKS FOR PROACTIVE OT DEFENSE

Securing Operational Technology (OT) in today’s industrial environments has never been more challenging, with blind spots like unmanaged legacy assets, transient devices, and unauthorized USBs presenting significant vulnerabilities. To make things worse, OT systems often rely on older, specialized equipment…

Cisco Flaw Let Attackers Run Command as Root User

A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This flaw tracked as CVE-2024-20418 enables unauthenticated, remote attackers to perform command injection attacks and execute arbitrary commands as…

New Malware Campaign Targets Windows Users Through Gaming Apps

A new malware strain, Winos4.0, is actively used in cyberattack campaigns. Discovered by FortiGuard Labs, this advanced malicious framework, which evolved from the infamous Gh0strat, is equipped with modular components enabling a range of malicious activities on compromised devices. These…

Earth 2 – 420,961 breached accounts

In October 2024, 421k unique email addresses from the virtual earth game Earth 2 were derived from embedded Gravatar images. Appearing alongside player usernames, the root cause was related to how Gravatar presents links to avatars as MD5 hashes within…