‘Zeus’ Hacker Group Strikes Israeli Olympic Athletes in Data Leak
Security presence has been heightened in Paris to ensure that the Games are safe, and Israeli athletes have been provided…
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited…
OAuth+XSS Attack Threatens Millions of Web Users With Account Takeover
An attack flow that combines API flaws within “log in with” implementations and Web injection bugs could affect millions of…
7 Sessions Not to Miss at Black Hat USA 2024
This year’s conference will be a treasure trove of insights for cybersecurity professionals. This year’s conference will be a treasure…
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
How Searchable Encryption Changes the Data Security Game
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…
New Research in Detecting AI-Generated Videos
The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research…
‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service…