Security News

The threat of location spoofing and fraud
2023-01-20 04:30

In this Help Net Security video, André Ferraz, CEO at Incognia, discusses the impact of location spoofing and location-based fraud. Any tool that enables users to alter the location information given by their device is known as location spoofing.

Threat attackers can own your data in just two days
2023-01-18 23:45

If the user navigates and clicks on the only visible file, a Link File Format file, the LNK file starts the infection process by launching a batch file. Attackers obtain the credentials of a service account via Kerberoasting, a known technique based on abusing valid Kerberos tickets, 15 minutes after the initial infection.

Potential threats and sinister implications of ChatGPT
2023-01-18 05:00

ChatGPT from OpenAI is a conversational chatbot recently released in preview mode for research purposes. It takes natural language as input and aims to solve problems, provide follow-up questions or even challenge assertions depending on your question.

Threats that will dominate headlines in 2023
2023-01-17 05:00

In this Help Net Security video, MacKenzie Jackson, Developer Advocate at GitGuardian, offers his cybersecurity predictions for 2032. These include: Developers will be a priority target for...

Post-quantum cybersecurity threats loom large
2023-01-16 04:00

The growing interest in quantum is translating into spending, demonstrated by 71% of quantum-adopting enterprises surveyed having current quantum computing budgets of more than $1 million. Interestingly, nearly 30% of respondents that have adopted or plan to adopt quantum computing expect to see a competitive advantage due to quantum computing within the next 12 months.

Threats of Machine-Generated Text
2023-01-13 12:13

This paper is a good survey of the field: what the threats are, how we might detect machine-generated text, directions for future research. Abstract: Advances in natural language generation have resulted in machine generated text that is increasingly difficult to distinguish from human authored text.

This can’t be a real bomb threat: you've called a modem, not a phone
2023-01-13 07:29

So Don was rather surprised one day to hear a phone ringing as he stalked the racks, because the kit there was dedicated to modems. "The caller only said 'BOMB. BOMB. BOMB.' with a strong Irish accent," don recalled.

New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors
2023-01-11 17:35

A new analysis of Raspberry Robin's attack infrastructure has revealed that it's possible for other threat actors to repurpose the infections for their own malicious activities, making it an even more potent threat. Raspberry Robin, attributed to a threat actor dubbed DEV-0856, is malware that has increasingly come under the radar for being used in attacks aimed at finance, government, insurance, and telecom entities.

Top SaaS Cybersecurity Threats in 2023: Are You Ready?
2023-01-09 07:56

SaaS applications are often multi-tenanted, so your applications need to be secure against attacks where one customer could access the data of another customer, such as logic flaws, injection flaws, or access control weaknesses. Security testing with an automated vulnerability scanner in combination with regular pentesting can help you design and build secure web applications by integrating with your existing environment, catching vulnerabilities as they're introduced throughout the development cycle.

How to prioritize effectively with threat modeling
2023-01-06 17:02

Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the "Your Consent Options" link on the site's footer.