A team of researchers has disclosed information on a fresh flaw in Intel CPUs that lets attackers steal encryption keys and other sensitive data…
General
Systems Using RTLS Are Susceptible To MITM Attacks And Location Manipulation
Multiple UWB RTLS (real-time locating systems) vulnerabilities have been found by security researchers, giving threat actors the ability to conduct man-in-the-middle attacks and modify…
Update Zoom For Mac Right Away To Prevent The Root-Access Flaw
It’s time for a manual update if you use Zoom on a Mac. The most recent version to the video conferencing software closes a…
1,900 People Signal Phone Numbers Were Revealed By The Twilio Attack
Nearly 1,900 Signal users’ phone numbers were made public as a result of the data breach Twilio, a cloud communications provider, had at the…
Three Microsoft-Signed Boot Loaders Have UEFI Secure Boot Bypasses, According To Researchers.
Unsigned third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypassing of the UEFI Secure Boot feature have been found to have a…
GoTestWAF Expands API Attack Testing With Support For OpenAPI
Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to…
Hackers Exploited Crypto Platform RenBridge To Launder $540 mn: Reports
More than half a billion dollars have been laundered in crypto assets originating from theft, fraud, ransomware and various other types of criminal activity…
Supply Chain Cybersecurity: Everyone’s Responsibility
This week, I had a conversation with a new client who revealed that they are eager to solve various internal problems relating to their…
Tornado Cash, A Virtual Currency Platform, is Charged With Supporting APTs
The virtual currency mixer was shut down by the U.S. Treasury for laundering more than $7 billion for hackers, including $455 million for the…
Windows And UnRAR Weaknesses Are Being Actively Used In The Field, According To CISA
Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its list of…