UPDATED OpenSea, the world’s largest non-fungible token (NFT) marketplace, has revealed that a rogue employee at a third-party vendor has shared its users email addresses with an...
A recently-patched security hole in Chromium browsers allowed attackers to bypass safeguards against dangling markup injection’, an attack that extracts sensitive information from webpages. While dangling markup...
A recent attack on a rare-earths processor shows a new facet of information warfare: weaponized NIMBYism. A Chinese disinformation effort against a Pentagon contractor building a...
Ukrainian government and private sector organizations have been the target of 796 cyberattacks since the start of the war on February 24, 2022, when Russia invaded...
A path traversal vulnerability in RarLab’s UnRAR binary can lead to remote code execution (RCE) on business email platform Zimbra and can potentially affect other software. The UnRAR...
Security teams have a new tool to hunt for malware, using open source YARA rules. YARAify can scan files using public YARA rules, integrate public and non-public...
A Phase III PQE contractor talks about getting federal quantum protection deployed quickly. There is a Chinese proverb that states that the best time to plant...
A poor implementation of Ed25519, a popular digital signature algorithm, has left dozens of cryptography libraries vulnerable to attacks. According to Konstantinos Chalkias, a cryptographer at...
Deliveries of prepared meals to thousands of vulnerable people in England continue to be disrupted following a “sophisticated” cyber-attack on food distributor Apetito. Apetito’s impacted UK...
The number of new ransomware families and unique variants has fallen over the last year, according to new research from WithSecure. The company, formerly known as...
Recent Comments