Cybersecurity Blog
National Vulnerability Backlog Could Surge to 30,000 by 2025
The National Vulnerability Database (NVD), maintained by the National Institute of Standards and Technology (NIST), ...
Acronis Warns of Cyber Infrastructure Default Password Abused in Attacks
The vulnerability (CVE-2023-45249) was patched nine months ago but is still being exploited in attacks. Admins are ...
Data From Deleted Github Repositories May Not Actually be Deleted
Researchers at Truffle Security have found, or arguably rediscovered, that data from deleted GitHub repositories (public ...
Gh0stGambit Dropper Used to Deploy Gh0st RAT Against Chinese Users
The Gh0st RAT Trojan is being distributed to Chinese Windows users through a fake Chrome website. The malware has been ...
AI-Generated Deepfake Attacks Force Companies To Reassess Cybersecurity
Companies are reevaluating their cybersecurity defenses in response to the rise of AI-generated deepfake attacks and ...
How Searchable Encryption Changes the Data Security Game
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals ...
Targeted PyPI Package Steals Google Cloud Credentials from macOS Devs
The malware is designed to target only 64 specific machines, attempting to exfiltrate Google Cloud Platform credentials ...
Most CISOs Feel Unprepared for New Compliance Regulations
Most CISOs are feeling unprepared for new compliance regulations, such as the SEC’s cybersecurity disclosure rules in ...