-

Temu denies breach after hacker claims theft of 87 million data records
Temu denies breach after hacker claims theft of 87 million data records Temu denies it was hacked or suffered a…
-

23:59, Time to Exfiltrate!, (Tue, Sep 17th)
23:59, Time to Exfiltrate!, (Tue, Sep 17th) Last week, I posted a diary about suspicious Python modules. One of them…
-

Cloudflare outage cuts off access to websites in some regions
Cloudflare outage cuts off access to websites in some regions A rolling Cloudflare outage is impacting access to web sites…
-

PKfail Secure Boot bypass remains a significant risk two months later
PKfail Secure Boot bypass remains a significant risk two months later Roughly nine percent of tested firmware images use non-production…
-

House Dem urges FCC to press ahead with disclosure rule around AI in political ads
House Dem urges FCC to press ahead with disclosure rule around AI in political ads House Dem urges FCC to…
-

Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution Sep 16, 2024Ravie LakshmananCloud Security / Vulnerability A…
-

CISA warns of Windows flaw used in infostealer malware attacks
CISA warns of Windows flaw used in infostealer malware attacks CISA has ordered U.S. federal agencies to secure their systems…
-
Windows vulnerability abused braille “spaces” in zero-day attacks
Windows vulnerability abused braille “spaces” in zero-day attacks [unable to retrieve full-text content]A recently fixed “Windows MSHTML spoofing vulnerability” tracked…
-

Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability Sep 14, 2024Ravie LakshmananEnterprise Security / Threat Intelligence Ivanti…
-
Finding Honeypot Data Clusters Using DBSCAN: Part 2, (Fri, Sep 13th)
Finding Honeypot Data Clusters Using DBSCAN: Part 2, (Fri, Sep 13th) In an earlier diary [1], I reviewed how using…
