Security News

Remote Access Policy
2024-03-17 16:00

As corporate conglomerates, small businesses and brick-and-mortar shops fade away in favor of a distributed offsite workforce, companies and employees can profit from the greater convenience and efficiency provided by remote access. Combined with a bring your own device policy, remote access can lower equipment costs, reduce office overhead and facilitate employee productivity.

New acoustic attack determines keystrokes from typing patterns
2024-03-17 14:22

Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor conditions, such as environments with noise. The attack leverages the distinctive sound emissions of different keystrokes and the typing pattern of users captured by specialized software to gather a dataset.

In the rush to build AI apps, please, please don't leave security behind
2024-03-17 11:04

Code components available from public repositories can contain hidden backdoors or data exfiltrators, and pre-built models and datasets can be poisoned to cause apps to behave unexpectedly inappropriately. Backdoored or malware-spiked libraries and models, if incorporated into shipped software, could leave users of those apps open to attack as well.

Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware
2024-03-17 09:00

Transitioning to memory-safe languages: Challenges and considerationsIn this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation, discusses the evolution of memory-safe programming languages and their emergence in response to the limitations of languages like C and C++. LastPass' CIO vision for driving business strategy, innovationRecently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. MobSF: Open-source security research platform for mobile appsThe Mobile Security Framework is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile.

Hackers exploit Aiohttp bug to find vulnerable networks
2024-03-16 14:17

The ransomware actor 'ShadowSyndicate' was observed scanning for servers vulnerable to CVE-2024-23334, a directory traversal vulnerability in the aiohttp Python library. On January 28, 2024, aiohttp released version 3.9.2, addressing CVE-2024-23334, a high-severity path traversal flaw impacting all versions of aiohttp from 3.9.1 and older that allows unauthenticated remote attackers to access files on vulnerable servers.

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
2024-03-16 12:31

Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamedĀ gitgub,...

BeyondTrust vs. CyberArk (2024): IAM Solutions Comparison
2024-03-16 02:46

CyberArk and BeyondTrust are some of the best Identity and Access Management and Privileged Access Management solutions providers for businesses. Feature comparison: CyberArk vs. BeyondTrust.

5 Best VPNs for Travel in 2024 (Free & Paid VPNs)
2024-03-15 21:56

In this article, we take a look at the five best VPNs for travelers. Since we're looking at the best VPNs for travel, server locations and the number of servers offered by a VPN will affect your experience the most.

Friday Squid Blogging: Operation Squid
2024-03-15 21:08

Gay parades for all you must all be gay or kneel before the gays in worship. We need more strong lesbian and gay alliance people here to spread their religion of homosexuality to others, even if it's completely off topic.

International Monetary Fund email accounts hacked in cyberattack
2024-03-15 19:48

The International Monetary Fund disclosed a cyber incident on Friday after unknown attackers breached 11 IMF email accounts earlier this year. The IMF has found no evidence that the attackers gained access to other systems or resources outside of the breached email accounts.