MITRE December 2023 attack: Threat actors created rogue VMs to evade detection Security The MITRE Corporation revealed that threat actors behind the December… rooter May 25, 2024 4 min read 0
Mandatory reporting for ransomware attacks? – Week in security with Tony Anscombe Security As the UK mulls new rules for ransomware disclosure, what… rooter May 25, 2024 1 min read 0
An XSS flaw in GitLab allows attackers to take over accounts Security GitLab addressed a high-severity cross-site scripting (XSS) vulnerability that allows… rooter May 24, 2024 2 min read 0
Friday Squid Blogging: Dana Squid Attacking Camera Security Fantastic footage of a Dana squid attacking a camera at… rooter May 24, 2024 1 min read 0
Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries Security Available as both an IDA plugin and a Python script,… rooter May 24, 2024 1 min read 0
Google fixes eighth actively exploited Chrome zero-day this year, the third in a month Security Google rolled out a new emergency security update to fix… rooter May 24, 2024 3 min read 0
On the Zero-Day Market Security New paper: “Zero Progress on Zero Days: How the Last… rooter May 24, 2024 1 min read 0
CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog Security CISA adds Apache Flink improper access control vulnerability to its… rooter May 24, 2024 2 min read 0
Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors Security The use of Dynamic DNS (DDNS) services embedded in appliances… rooter May 24, 2024 6 min read 0
Recall feature in Microsoft Copilot+ PCs raises privacy and security concerns Security UK data watchdog is investigating Microsoft regarding the new Recall… rooter May 24, 2024 2 min read 0