Category: EN

What to do when social media accounts get hacked or impersonated

In the era of social media, users freely share a plethora of information with their connections and followers, often overlooking the potential threat to their privacy. Opportunistic hackers seize on these vulnerabilities, infiltrating or impersonating accounts and causing significant trouble…

Coming Soon to a Network Near You: More Shadow IoT

Consumer IoT devices will increase the threat to commercial, government, healthcare, educational, and other organizations. The post Coming Soon to a Network Near You: More Shadow IoT appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

The Role of XBOMs in Supporting Cybersecurity

SBOMs aren’t the only bills of materials that are necessary for the protection of your tech stack. XBOMs are growing in importance. The post The Role of XBOMs in Supporting Cybersecurity appeared first on Security Boulevard. This article has been…

FTC Issues Its First-Ever Order Against a Data Broker

Federal regulators are banning OutLogic from selling or sharing sensitive location data to third parties, marking the latest effort by government officials to address the thorny issue of data brokers and what they do with the massive amounts of personal…

Implementation Flaws Identified in Post-Quantum Encryption Algorithm

  Two implementation flaws have been identified in the Kyber key encapsulation mechanism (KEM), an encryption standard intended to safeguard networks from future attacks by quantum computers. Collectively known as “KyberSlash,” these flaws could allow cybercriminals to discover encryption keys. …

New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems

Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache OfBiz open-source Enterprise Resource Planning (ERP) system to execute a memory-resident payload. The vulnerability in question is CVE-2023-51467 (CVSS score: 9.8), a bypass for another severe shortcoming in…

Medusa Ransomware Turning Your Files into Stone

Medusa ransomware gang has not only escalated activities but launched a leak site. We also analyze new TTPS encountered in an incident response case. The post Medusa Ransomware Turning Your Files into Stone appeared first on Unit 42. This article…