Tag: Security Architect
Linux Distros Hit by RCE Vulnerability in Shim Bootloader
Linux shim, a small piece of code that many major Linux distros use during the secure boot process, has a remote code execution vulnerability...
Breaking News
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine
Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari.The bug, assigned as CVE-2024-23222, stems from a type confusion...
Google Releases Eighth Zero-Day Patch of 2023 for Chrome
Google has issued an urgent update to address a recently discovered vulnerability in Chrome that has been under active exploitation in the wild, marking...
Microsoft: Multiple Perforce Server Flaws Allow for Network Takeover
Microsoft has identified four vulnerabilities in the Perforce source-code management platform, the most critical of which gives attackers access to a highly privileged Windows...
Google Patches Another Chrome Zero-Day as Browser Attacks Mount
For the fourth time since August, Google has disclosed a bug in its Chrome browser technology that attackers were actively exploiting in the wild...
Google Patches Another Chrome Zero-Day as Browser Attacks Mount
For the fourth time since August, Google has disclosed a bug in its Chrome browser technology that attackers were actively exploiting in the wild...
Accelerating AI/ML development at BMW Group with Amazon SageMaker Studio | Amazon Web Services
This post is co-written with Marc Neumann, Amor Steinberg and Marinus Krommenhoek from BMW Group. The BMW Group – headquartered in Munich, Germany –...
Scattered Spider Hops Nimbly from Cloud to On-Prem in Complex Attack
The group behind the high-profile MGM cyberattack in September has resurfaced in yet another sophisticated ransomware attack, in which the actor pivoted from a...
Citrix Bleed Bug Inflicts Mounting Wounds, CISA Warns
Ransomware affiliates for the LockBit 3.0 gang are ramping up their assault on the so-called "Citrix Bleed" security vulnerability, resulting in re-upped warnings from...
Safari Side-Channel Attack Enables Browser Theft
Researchers have developed a side-channel exploit for Apple CPUs, enabling sophisticated attackers to extract sensitive information from browsers.Side-channel attacks are usually overlooked, often physical...
QR Code 101: What the Threats Look Like
As QR codes have become ubiquitous, their proliferation has given rise to new and emerging security risks.More than 80% of US-based QR code users...
Kroll’s Crypto Breach Highlights SIM-Swapping Risk
A recent supply chain breach at Kroll, the risk and financial advisory firm, affected downstream customers and exposed personal information on hundreds of claimants in bankruptcy...
Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response
Microsoft has been leaning into its $10 billion investment in OpenAI by introducing AI assistants – all called Copilot – across its product portfolio....