Technology

Mar 04, 2023The Hacker NewsSaaS Security / Cyber Security This past January, a SaaS Security Posture Management (SSPM) company named Wing Security (Wing) made waves with the launch of its free SaaS-Shadow IT discovery solution. Cloud-based companies were invited to gain insight into their employees’ SaaS usage through a completely free, self-service product that operates
0 Comments
Mar 03, 2023Ravie LakshmananThreat Intelligence / Cyber Attack The China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang as part of an ongoing social engineering campaign that commenced in January 2023. “Unlike most of the group’s malware, MQsTTang doesn’t seem to be based on existing families or publicly available
0 Comments
March 1st, the House Foreign Affairs Committee voted on H.R. 1153, a bill to give the president “the power to ban…. TikTok.”  And not just to ban TikTok. Giving the president the power to ban any app from “a foreign entity that is ‘subject to the influence of China’.” This is just one in a four-year
0 Comments
Samsung Galaxy A32 5G smartphone was launched by the South Korean conglomerate in January 2021, as the company’s most affordable smartphone offering of its time. The budget-friendly A-series smartphone from Samsung launched featuring a 5,000mAh battery with support for 15W fast charging. However, a user has reportedly modded the standard Samsung Galaxy A32 5G with
0 Comments
Mar 03, 2023Ravie LakshmananEnterprise Security / IoT A pair of serious security defects has been disclosed in the Trusted Platform Module (TPM) 2.0 reference library specification that could potentially lead to information disclosure or privilege escalation. One of the vulnerabilities, CVE-2023-1017, concerns an out-of-bounds write, while the other, CVE-2023-1018, is described as an out-of-bounds read.
0 Comments
Mar 02, 2023Ravie LakshmananContainer Security / Cyber Threat A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. “The attacker exploited a containerized workload and then leveraged it to perform privilege escalation into an AWS account in order to steal proprietary software and credentials,” Sysdig said in
0 Comments
Qualcomm launched Snapdragon 8 Gen 2 SoC in November last year. Now, the California-based chip maker in association with Thales has announced the first commercially deployable iSIM (integrate SIM) functionality on the Snapdragon 8 Gen 2 chipset at MWC 2023. The iSIM solution will integrate SIM functionality directly into a smartphone’s processor and allows devices
0 Comments
Mar 01, 2023Ravie LakshmananThreat Intelligence / Malware Six different law firms were targeted in January and February 2023 as part of two disparate threat campaigns distributing GootLoader and FakeUpdates (aka SocGholish) malware strains. GootLoader, active since late 2020, is a first-stage downloader that’s capable of delivering a wide range of secondary payloads such as Cobalt
0 Comments
Mar 01, 2023Ravie LakshmananEndpoint Security / Cyber Threat A stealthy Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus has become the first publicly known malware capable of bypassing Secure Boot defenses, making it a potent threat in the cyber landscape. “This bootkit can run even on fully up-to-date Windows 11 systems with UEFI Secure Boot
0 Comments
Feb 28, 2023Ravie LakshmananRansomware / Malware Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat. MortalKombat is a new ransomware strain that emerged in January 2023. It’s based on commodity ransomware dubbed Xorist and has been observed in attacks targeting entities in the U.S., the Philippines, the
0 Comments
As digital transformation takes hold and businesses become increasingly reliant on digital services, it has become more important than ever to secure applications and APIs (Application Programming Interfaces). With that said, application security and API security are two critical components of a comprehensive security strategy. By utilizing these practices, organizations can protect themselves from malicious
0 Comments