Tag: EN

The Role of XBOMs in Supporting Cybersecurity

SBOMs aren’t the only bills of materials that are necessary for the protection of your tech stack. XBOMs are growing in importance. The post The Role of XBOMs in Supporting Cybersecurity appeared first on Security Boulevard. This article has been…

FTC Issues Its First-Ever Order Against a Data Broker

Federal regulators are banning OutLogic from selling or sharing sensitive location data to third parties, marking the latest effort by government officials to address the thorny issue of data brokers and what they do with the massive amounts of personal…

Implementation Flaws Identified in Post-Quantum Encryption Algorithm

  Two implementation flaws have been identified in the Kyber key encapsulation mechanism (KEM), an encryption standard intended to safeguard networks from future attacks by quantum computers. Collectively known as “KyberSlash,” these flaws could allow cybercriminals to discover encryption keys. …

New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems

Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache OfBiz open-source Enterprise Resource Planning (ERP) system to execute a memory-resident payload. The vulnerability in question is CVE-2023-51467 (CVSS score: 9.8), a bypass for another severe shortcoming in…

Medusa Ransomware Turning Your Files into Stone

Medusa ransomware gang has not only escalated activities but launched a leak site. We also analyze new TTPS encountered in an incident response case. The post Medusa Ransomware Turning Your Files into Stone appeared first on Unit 42. This article…

Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices

Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things (IoT) devices.  Mirai’s ability to recruit a massive number of compromised devices allows attackers to do the following things to…

Swatting: Cyber Attacks on Healthcare

  In a concerning trend, cybercriminals are using a tactic called “swatting” to target medical institutions via their patients, aiming to coerce hospitals into paying ransoms. Swatting involves making repeated false reports to the police about individuals, leading armed authorities…

5 ways to secure identity and access for 2024

To confidently secure identity and access at your organization, here are five areas Microsoft recommends prioritizing in the new year.​ The post 5 ways to secure identity and access for 2024 appeared first on Microsoft Security Blog. This article has…