Cybersecurity Blog
CrowdStrike Outage Renews Supply Chain Concerns, Federal Officials Say
Federal officials have raised concerns about the software supply chain and memory safety vulnerabilities following a ...
Evasive Panda Compromises ISP to Distribute Malicious Software Updates
The group used DNS poisoning to redirect software update queries to attacker-controlled servers, infecting victims with ...
White House Officials Meet with Allies, Industry on Connected Car Risks
Representatives from various countries and the European Union participated in the meeting, addressing cybersecurity and ...
Linux Kernel Impacted by New SLUBStick Cross-Cache Attack
A new Linux Kernel attack called SLUBStick has a 99% success rate in turning a limited heap vulnerability into a ...
Mozilla Follows Google in Distrusting Entrust’s TLS Certificates
Mozilla has joined Google in no longer trusting Entrust as a root certificate authority due to compliance failures and ...
Cryptonator Seized for Laundering Ransom Payments, Stolen Crypto
The U.S. and German law enforcement have seized the domain of the Cryptonator crypto wallet platform, indicting its ...
Researchers Uncover Flaws in Windows Smart App Control and SmartScreen
Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and ...
Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity ...