News & Updates

Imperva Red Team Discovers Vulnerability in TikTok That Can Reveal User Activity and Information

TL;DR The Imperva Red Team discovered a vulnerability in TikTok, a popular social media platform with more than one billion users worldwide, that could allow attackers to monitor users’ activity on both mobile and desktop devices. This vulnerability, which has now been fixed, was caused by a window message event handler that does not properly […]

The post Imperva Red Team Discovers Vulnerability in TikTok That Can Reveal User Activity and Information appeared first on Blog.

News & Updates

Chrome to Drop Familiar ‘Lock’ Icon as It Might Be Actually Helping Phishers, Google Says

Google has announced plans to rid Chrome of the ubiquitous lock icon indicating
a secure connection, as it no longer serves its intended purpose – and might be
doing more harm than good.

The padlock icon in Chrome’s URL bar was – and still is – primarily intended to
indicate a secure connection over HTTPS. But it’s more than just a simple image.
If clicked, the icon displays a trove of information about the site visited,
such as the validity of its security certificate, cookies and site data, a

News & Updates

BlackCat group releases screenshots of stolen Western Digital data

Ransomware group BlackCat has released a set of screenshots on its leak site that it claims are from data stolen from Western Digital in an April system breach. The images include screenshots of videoconferences and internal emails of the storage device manufacturer, according to a tweet by cybersecurity researcher Dominic Alvieri.

The screenshots also included an image of a recent meeting held by Western Digital where the company was discussing how to respond to the cyberattack. The ransomware group, along with the image, wrote, “with the finest threat hunters Western Digital has to offer.” The images of the participants were blurred.

To read this article in full, please click here

Threats

WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat

Since the outbreak of the global cyber war, state bodies of Ukraine and its allies have become targets of diverse malicious campaigns launched by multiple hacking collectives. Experts estimate a 250% surge of cyber attacks against Ukraine in 2022 and over 2,000 of them launched by russia-affiliated threat actors since the beginning of the full-fledged […]

The post WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat appeared first on SOC Prime.

News & Updates

Skilling up the security team for the AI-dominated era

As artificial intelligence and machine learning models become more firmly woven into the enterprise IT fabric and the cyberattack infrastructure, security teams will need to level up their skills to meet a whole new generation of AI-based cyber risks.

Forward-looking CISOs are already being called upon to think about newly emerging risks like generative AI-enabled phishing attacks that will be more targeted than ever or adversarial AI attacks that poison learning models to skew their output. And those are just a couple examples among a host of other new risks that will crop up in what’s looking to be the AI-dominated era of the future.

Time to prepare for AI-powered attacks

There is still time to prepare for many of these risks. Just the faintest amount of demonstrable data shows that attackers are beginning to use large language model (LLM) powered tools like ChatGPT to boost their attacks. And most adversarial AI examples are still largely theoretical. However, these risks will only stay theoretical for so long and is time to start building a bench of AI-related risk expertise.

To read this article in full, please click here

News & Updates

Apple and Google Join Forces to Stop Unauthorized Tracking Alert System

Apple and Google have teamed up to work on a draft industry-wide specification that’s designed to tackle safety risks and alert users when they are being tracked without their knowledge or permission using devices like AirTags.
“The first-of-its-kind specification will allow Bluetooth location-tracking devices to be compatible with unauthorized tracking detection and alerts across Android and
Cybersecurity Tools

SECURITY ALERT: Danish Customers Targeted by Active PostNord DK Phishing Campaign

Heimdal® has recently discovered what can very well be the debut of a massive phishing campaign unfolding in the Nordics. According to a tip sent to us by an anonymous reader, the APT’s choice in phishing is an email in which the victim is informed about the status of an unclaimed postal package. Further analysis […]

The post SECURITY ALERT: Danish Customers Targeted by Active PostNord DK Phishing Campaign appeared first on Heimdal Security Blog.

Security

Divorce

Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book

Exit mobile version