Microsoft has issued a paper for the largely-anticipated glass-based storage tech that it’s been planning to replace the traditional technology that’s best fitted into the hard drives and best SSDs out in the market today. The academic paper (which is…
Tag: EN
Fresh SLAM Attack Extracts Sensitive Data from AMD CPUs and Upcoming Intel Processors
Academic researchers have unveiled a novel side-channel attack named SLAM, designed to exploit hardware enhancements meant to bolster security in forthcoming CPUs from major manufacturers like Intel, AMD, and Arm. The attack aims to retrieve the root password hash…
New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of…
Ex-Uber CSO Joe Sullivan on why he ‘had to get over’ shock of data breach conviction
Before joining Uber as chief security officer in 2015, Joe Sullivan served for two years as a federal prosecutor with the United States Department of Justice, where he specialized in computer hacking and IP issues. He worked on a number…
In Other News: Fake Lockdown Mode, New Linux RAT, AI Jailbreak, Country’s DNS Hijacked
Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked. The post In Other News: Fake Lockdown Mode, New Linux RAT, AI Jailbreak, Country’s DNS Hijacked…
Seoul Police Reveals: North Korean Hackers Stole South Korean Anti-Aircraft Data
South Korea: Seoul police have charged Andariel, a North Korea-based hacker group for stealing critical defense secrets from South Korea’s defense companies. Allegedly, the laundering ransomware is redirected to North Korea. One of the 1.2 terabytes of data the hackers…
Atlassian Releases Security Advisories for Multiple Products
Atlassian has released security updates to address vulnerabilities affecting multiple Atlassian products. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following advisories and apply…
Five Cybersecurity Tabletop Exercise Myths Debunked
Understand what tabletop exercises are and how they can help your organization better prepare for a cyber incident. This article has been indexed from CISO Collective Read the original article: Five Cybersecurity Tabletop Exercise Myths Debunked
Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan
TA446’s new TTPs: “Star Blizzard” FSB team called out by Five Eyes governments (again). The post Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Trojan Malware Hidden in Cracked macOS Software, Kaspersky Says
Newly discovered cracked applications being distributed by unauthorized websites are delivering Trojan-Proxy malware to macOS users who are looking for free or cheap versions of the software tools they want. The malware can be used by bad actors for a…