Year: 2024

Zoom Adding Post-Quantum End-to-End Encryption to Products

Video communications giant Zoom announced on Tuesday that post-quantum end-to-end encryption (E2EE) has been added to Zoom Workplace. The feature, which leverages the Kyber 768 key encapsulation method, is currently available worldwide in Zoom Meetings, with Zoom Phone and Zoom Rooms coming soon. Zoom claims it is the first unified communications-as-a-service company to offer a post-quantum E2EE […]
Read More

Critical Flaw in AI Python Package Can Lead to System and Data Compromise

A critical vulnerability discovered recently in a Python package used by AI application developers can allow arbitrary code execution, putting systems and data at risk. The issue, discovered by researcher Patrick Peng (aka retr0reg), is tracked as CVE-2024-34359 and it has been dubbed Llama Drama. Cybersecurity firm Checkmarx on Thursday published a blog post describing the vulnerability and […]
Read More

Microsoft Quick Assist Tool Abused for Ransomware Delivery

Cybercriminals who have been using the Black Basta ransomware have been observed abusing the remote management tool Quick Assist in vishing (voice phishing) attacks, Microsoft reports. Active since 2022 and believed to have hit over 500 organizations globally, Black Basta is a ransomware-as-a-service (RaaS) that likely received over $100 million in ransom payments from its victims. Last […]
Read More

Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS

Apple on Monday rolled out urgent security-themed updates to its flagship mobile and desktop operating systems and warned that hackers may have already exploited an IOS vulnerability in the wild. Cupertino’s security response team documented at least 16 vulnerabilities on iPhones and iPads and called special attention to CVE-2024-23296, a memory corruption bug in RTKit […]
Read More

New Case Study: The Malicious Comment

When is a ‘Thank you’ not a ‘Thank you’? When it’s a sneaky bit of code that’s been hidden inside a ‘Thank You’ image that somebody posted in the comments section of a product page! The guilty secret hidden inside this particular piece of code was designed to let hackers bypass security controls and steal […]
Read More

Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices

A newly identified Android trojan can steal user information and provide attackers with the ability to take control of infected devices, threat detection company ThreatFabric reports. Dubbed Brokewell, the trojan includes all the capabilities of mobile banking malware, while also providing attackers with remote access to devices. Brokewell is being distributed via fake application updates, such […]
Read More

How to Align Your Incident Response Practices With the New SEC Disclosure Rules

As of December 18, 2023, publicly traded organizations must comply with the Security and Exchange Commission (SEC) incident disclosure regulations, which were originally unveiled in July 2023. Under the new rules, publicly traded companies will be required to report cyber incidents within four business days of determining that the incident is “material,” meaning it would potentially impact a […]
Read More

Chinese hackers are aiming to ‘wreak havoc’ on U.S. Critical infrastructure

United States officials say they dismantled a China-backed hacking operation targeting civilian infrastructure, but the Federal Bureau of Investigation (FBI) warned of future threats if the two superpowers ever go to war. The Chinese state-sponsored hacking group Volt Typhoon allegedly sought to damage public sector facilities such as water treatment plants, the electric grid, oil and natural […]
Read More

No products in the cart.

Subscribe to our newsletter

Sign up to receive latest news, updates, promotions, and special offers delivered directly to your inbox.
No, thanks
X