DDoS threat report for 2024 Q2
Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth...
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
Detection is a traditional type of cybersecurity control, along with blocking, adjustment, administrative and other controls. Whereas before...
RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks
Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be...
RADIUS/UDP vulnerable to improved MD5 collision attack
The MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely...
Biden-Harris Administration to Invest Up to $1.6 Billion to Establish and Accelerate Domestic Capacity Advanced Packaging
Today, as part of President Biden’s Investing in America agenda, the U.S. Department of Commerce issued a Notice...
Tornadoes Are Deadly. These New Building Codes Will Save Lives.
NIST research has led to the first building code provision for tornado resilience. Source:: NIST
Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks
Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured Jenkins Script Console instances to...
HUMINT: Diving Deep into the Dark Web
Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components:...
GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel
Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android...
China’s Moore Threads upgrades AI data center solution amid US restrictions
Chinese GPU startup Moore Threads has announced an upgrade to its KUAE AI data center solution, boosting the...
Ticketmaster warns customers to take action after hack
Ticketmaster customers have been advised to sign up to a cyber security service after a hack in May....
Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation
Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have released...
Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what...
China’s BYD agrees $1bn Turkey factory deal
The electric vehicle giant has been expanding manufacturing capacity outside of its home country. Source:: BBC News –...
Is AI the answer for better government services?
Governments are experimenting with AI chatbots that can give help and advice. Source:: BBC News – Technology
Computer maker Zotac exposed customers’ RMA info on Google Search
Computer hardware maker Zotac has exposed return merchandise authorization (RMA) requests and related documents online for an unknown...
Amazon CloudFront announces managed cache policies for web applications
Amazon CloudFront announces two new managed cache policies, UseOriginCacheControlHeaders and UseOriginCacheControlHeaders-QueryStrings, for dynamically generated websites and applications that...
Hackers leak 39,000 print-at-home Ticketmaster tickets for 154 events
In an ongoing extortion campaign against Ticketmaster, threat actors have leaked almost 39,000 print-at-home tickets for 150 upcoming...
FreeRTOS releases new Long Term Support version
Today, AWS announced the third release of FreeRTOS Long Term Support (LTS) – FreeRTOS 202406 LTS. FreeRTOS LTS...
Neiman Marcus data breach: 31 million email addresses found exposed
A May 2024 data breach disclosed by American luxury retailer and department store chain Neiman Marcus last month...