Chainguard, a Kirkland, WA-based software supply chain security company, raised $61M in Series B funding. The round was led by Spark Capital and existing investors Sequoia Capital, Amplify Partners, The Chainsmoker’s Mantis VC, and Banana Capital. The company intends to use the funds to expand the global go-to-market team, invest in product research and innovation […]
Google on Tuesday announced the release of Chrome 119 to the stable channel with patches for 15 vulnerabilities, including 13 reported by external researchers. Three of the externally reported bugs have a severity rating of ‘high’, and are described as inappropriate implementation in Payments (CVE-2023-5480), insufficient data validation in USB (CVE-2023-5482), and integer overflow in […]
The decline in VC funding for cybersecurity startups might finally be reversing course after months of discouraging trend lines. Recently, Crunchbase reported that cybersecurity startups raised nearly $1.9 billion through 153 deals in Q3 — a 12% increase from the $1.7 billion raised across 181 deals in the previous quarter. There’s anecdotal evidence of a […]
Microsoft’s block on Visual Basic for Applications (VBA) macros has led attackers to experiment with different file types, with XLL files now being used as a means to distribute malware.
VMware Carbon Black’s Threat Analysis Unit (TAU) has identified dozens of previously unknown vulnerable kernel drivers that could be exploited by attackers to alter firmware or escalate privileges. It’s not uncommon for threat actors, including cybercriminals and state-sponsored groups, to abuse kernel drivers in their operations. Such drivers can allow malicious hackers to manipulate system […]
Auto Blocker prevents the installation of risky apps downloaded from outside the official app stores to protect users from malware and spyware. It also blocks unauthorized commands and software installations via the USB port.
A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service that’s offered to other threat actors for at least over the past four years. Prolific Puma creates “domain names with an RDGA [registered domain generation algorithm] and use these domains to provide a link shortening […]
The library is working with the UK’s National Cyber Security Centre (NCSC) and cybersecurity specialists to investigate the incident, but the nature of the attack and how the systems were breached are still unknown.
Digital attacks against the U.S. by Iran and non-state actors could worsen if the conflict between Israel and Hamas grows, FBI Director Christopher Wray warned on Tuesday. The “cyber targeting of American interests and critical infrastructure that we already see conducted by Iran and non-state actors alike, we can expect to get worse if the […]