Tennessee Man Helped DPRK Workers Get Jobs at US Orgs, Fund WMDs
US citizens play middleman between US companies and the North Korean government agents they unwittingly hire. US citizens play middleman…
A Lesson From the CrowdStrike Incident
The recent outage highlights the critical importance of adhering to established processes and governance frameworks. The recent outage highlights the…
How Phishing Attacks Adapt Quickly to Capitalize on Current Events
In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to…
FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could…
The AI Hangover is Here – The End of the Beginning
After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the…
Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems
Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and…
Taxonomy of Generative AI Misuse
Interesting paper: “Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data“: Generative, multimodal artificial intelligence (GenAI) offers…
Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks
Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root…