Vulnerabilities

Google Launches Red Team to Secure AI Systems Against Attacks
Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...

‘China’ Azure Breach: MUCH Worse Than Microsoft Said
Storm-0558 Breaks: Satya and Pooh, sitting in a tree, K.I.S.S.I.N.G ...

GitHub Developers Targeted by North Korea’s Lazarus Group
The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...

Software Supply Chain Attackers Targeting Banks, Checkmarx Says
Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry ...

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...

New P2P Worm Puts Windows and Linux Redis Servers in its Sights
A new peer-to-peer (P2P) worm, P2PInfect, is spreading across instances of the Redis open source database software in the cloud ...

FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware According to the Symantec Threat Hunter Team, the financially motivated threat actor known as FIN8 has been observed using ...

Why Generative AI is a Threat to API Security
Generative AI can be used to amplify cybercriminals' nefarious deeds against web applications, especially those that rely heavily on APIs ...

Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...