New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords

27/03/2023 0 Comments 0 tags

A new information-stealing malware has set its sights on Apple’s macOS operating system to siphon sensitive information from compromised devices. Dubbed MacStealer, it’s the latest example of a threat that uses

Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot Tools

27/03/2023 0 Comments 0 tags

Microsoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool for Windows 10 and Windows 11. The issue, dubbed aCropalypse, could enable malicious actors to recover

Where SSO Falls Short in Protecting SaaS

27/03/2023 0 Comments 0 tags

Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one set of credentials. From a security standpoint, SSO is the

U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals

25/03/2023 0 Comments 0 tags

In what’s a case of setting a thief to catch a thief, the U.K. National Crime Agency (NCA) revealed that it has created a network of fake DDoS-for-hire websites to

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

25/03/2023 0 Comments 0 tags

Microsoft on Friday shared guidance to help customers discover indicators of compromise (IoCs) associated with a recently patched Outlook vulnerability. Tracked as CVE-2023-23397 (CVSS score: 9.8), the critical flaw relates to a

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

25/03/2023 0 Comments 0 tags

OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other users’ personal information and chat titles in the upstart’s ChatGPT

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

24/03/2023 0 Comments 0 tags

A malicious Python package on the Python Package Index (PyPI) repository has been found to use Unicode as a trick to evade detection and deploy an info-stealing malware. The package

THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps

24/03/2023 0 Comments 0 tags

Any app that can improve business operations is quickly added to the SaaS stack. However, employees don’t realize that this SaaS-to-SaaS connectivity, which typically takes place outside the view of

GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations

24/03/2023 0 Comments 0 tags

Cloud-based repository hosting service GitHub said it took the step of replacing its RSA SSH host key used to secure Git operations “out of an abundance of caution” after it

Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies

24/03/2023 0 Comments 0 tags

A recent campaign undertaken by Earth Preta indicates that nation-state groups aligned with China are getting increasingly proficient at bypassing security solutions. The threat actor, active since at least 2012, is tracked by