TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

18/01/2024 0 Comments 0 tags

Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could have been exploited to orchestrate supply chain attacks. The misconfigurations could be abused by an attacker to

Zero-Day Alert: Update Chrome Now to Fix New Actively Exploited Vulnerability

17/01/2024 0 Comments 0 tags

Google on Tuesday released updates to fix four security issues in its Chrome browser, including an actively exploited zero-day flaw. The issue, tracked as CVE-2024-0519, concerns an out-of-bounds memory access

Citrix, VMware, and Atlassian Hit with Critical Flaws — Patch ASAP!

17/01/2024 0 Comments 0 tags

Citrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) that are being actively exploited in the wild. The flaws

GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

17/01/2024 0 Comments 0 tags

GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be potentially exploited to gain access to credentials within a production container. The

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

17/01/2024 0 Comments 0 tags

Cybersecurity researchers have identified a “lightweight method” called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator.  Kaspersky, which analyzed a

Webinar: The Art of Privilege Escalation – How Hackers Become Admins

17/01/2024 0 Comments 0 tags

In the digital age, the battleground for security professionals is not only evolving, it’s expanding at an alarming rate. The upcoming webinar, “The Art of Privilege Escalation – How Hackers

Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

17/01/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat actors deploying the AndroxGh0st malware are creating a botnet for “victim identification and exploitation in target

Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation

17/01/2024 0 Comments 0 tags

Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of AI and AI-powered SaaS applications. This will allow companies to better protect

PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions

17/01/2024 0 Comments 0 tags

The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be weaponized by threat actors to execute arbitrary code. The STM Cyber R&D

Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims

17/01/2024 0 Comments 0 tags

The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of one year between 2022 and 2023. The scheme “leveraged high-quality phishing pages to lure