Security News > 2024 > March

Duo vs Microsoft Authenticator (2024): Which Tool is Better?
2024-03-22 16:07

Microsoft Authenticator utilizes push notifications, one-time passcodes and can integrate with Microsoft 365 and Microsoft Entra ID. While both 2FA options share some similarities, there are key differences that can sway your decision to choose one over the other. Microsoft Authenticator is free and comes bundled with all Microsoft Entra ID and 365 Business accounts.

Hardware-level Apple Silicon vulnerability can leak cryptographic keys
2024-03-22 15:03

Apple is having its own Meltdown/Spectre moment with a new side-channel vulnerability found in the architecture of Apple Silicon processors that gives malicious apps the ability to extract cryptographic keys. "We reverse-engineered DMPs on Apple m-series CPUs and found that the DMP activates data loaded from memory that 'looks like' a pointer," the team say in the paper.

New GoFetch attack on Apple Silicon CPUs can steal crypto keys
2024-03-22 15:01

A new side-channel attack called "GoFetch" impacts Apple M1, M2, and M3 processors and can be used to steal secret cryptographic keys from data in the CPU's cache. The attack targets constant-time cryptographic implementations using data memory-dependent prefetchers found in modern Apple CPUs.

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.
2024-03-22 14:08

Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100...

Auth0 vs Okta (2024): Which IAM Software Is Better?
2024-03-22 14:00

Auth0 and Okta are powerful IAM tools with distinct strengths that solve this problem. The key difference perhaps lies in how Auth0 and Okta approach identity.

NVD slowdown leaves thousands of vulnerabilities without analysis data
2024-03-22 13:45

NIST is currently working to establish a consortium to address challenges in the NVD program and develop improved tools and methods. That's a good thing, because a CVE without its NVD data is pretty meaningless.

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking
2024-03-22 13:45

Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited...

US organizations targeted with emails delivering NetSupport RAT
2024-03-22 12:48

Employees at US-based organizations are being targeted with emails delivering NetSupport RAT malware via "Nuanced" exploitation and by using an advanced detection evasion method. The phishing emails prompts recipients to download an attached Office Word file to view their "Monthly salary report".

CISA: Here’s how you can foil DDoS attacks
2024-03-22 11:44

In light of the rise of "DDoS hacktivism" and the recent DDoS attacks aimed at disrupting French and Alabama government websites, the Cybersecurity and Infrastructure Security Agency has updated its guidance of how governmental entities should respond to this type of attacks. "The main advantage of a DDoS attack over a DoS attack is the ability to generate a significantly higher volume of traffic, overwhelming the target system's resources to a greater extent," the agency says.

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
2024-03-22 11:28

A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux...