Cybersecurity Blog
Homeland Security Hopes to Scuttle Maritime Cyber-Threats
The U.S. Department of Homeland Security (DHS) has issued a request for information to assess the security of technology ...
PoC Exploit Releases for Windows Elevation of Privilege Vulnerability (CVE-2024-26230)
A PoC exploit for an Elevation of Privilege vulnerability in Windows has been released by a security researcher. This ...
Musician Charged With $10M Streaming Royalties Fraud Using AI and Bots
North Carolina musician Michael Smith has been indicted for allegedly scamming over $10 million in royalty payments from ...
CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks
CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing ...
Lazarus Group Targets Blockchain Pros with Fake Video Conferencing, Job Scam
The Lazarus Group, known for financially motivated cyber campaigns, is targeting blockchain professionals through fake ...
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
A novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory ...
New RAMBO Attack Steals Data Using RAM in Air-Gapped Computers
The attack involves malware manipulating the computer’s RAM to emit controlled electromagnetic radiation that can ...
Critical Kibana Flaws Expose Systems to Arbitrary Code Execution
A couple of critical vulnerabilities in Kibana, tracked as CVE-2024-37288 and CVE-2024-37285, can lead to arbitrary code ...