It’s time for a manual update if you use Zoom on a Mac. The most recent version to the video conferencing software closes a…
General
1,900 People Signal Phone Numbers Were Revealed By The Twilio Attack
Nearly 1,900 Signal users’ phone numbers were made public as a result of the data breach Twilio, a cloud communications provider, had at the…
Three Microsoft-Signed Boot Loaders Have UEFI Secure Boot Bypasses, According To Researchers.
Unsigned third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypassing of the UEFI Secure Boot feature have been found to have a…
GoTestWAF Expands API Attack Testing With Support For OpenAPI
Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to…
Hackers Exploited Crypto Platform RenBridge To Launder $540 mn: Reports
More than half a billion dollars have been laundered in crypto assets originating from theft, fraud, ransomware and various other types of criminal activity…
Supply Chain Cybersecurity: Everyone’s Responsibility
This week, I had a conversation with a new client who revealed that they are eager to solve various internal problems relating to their…
Tornado Cash, A Virtual Currency Platform, is Charged With Supporting APTs
The virtual currency mixer was shut down by the U.S. Treasury for laundering more than $7 billion for hackers, including $455 million for the…
Windows And UnRAR Weaknesses Are Being Actively Used In The Field, According To CISA
Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its list of…
Cyberattack Affects The NHS 111 Emergency Line in the UK
Due to a recent significant cyber assault, a critical system used in the UK for the distribution of emergency drugs and ambulance transportation has…
The New Orchard Botnet Creates Malicious Domains Using Information from the Bitcoin Founder’s Account
A new botnet known as Orchard has been seen creating domain names to hide its command-and-control (C2) infrastructure using Satoshi Nakamoto’s account transaction data.…