Monthly Archives: August 2024

Navigating the Shadows: Safeguarding AI Infrastructure Amidst CVE-2023-48022

Originally published by Truyo.We all want to leverage AI, but models are only as good as the data used to train them. Often, training data is comprised of confidential information. How do you balance the need to make an AI run effectively without exposing PII? It’s not only the initial training that could be exposing […]

New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to elevate a limited heap vulnerability to an arbitrary memory read-and-write primitive. “Initially, it exploits a timing side-channel of the allocator to perform a cross-cache attack reliably,” a group of academics from the Graz University of Technology […]

Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to execute malicious JavaScript in a victim’s web browser and steal sensitive information from their account under specific circumstances. “When a victim views a malicious email in Roundcube sent by an attacker, the attacker can execute arbitrary JavaScript […]

The Hydra Effect: Why Shutting Down RaaS is Like Playing Whack-a-Mole

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.As a CISO in Residence, one of my favorite activities is presenting on various topics at regional security summits. It lets me share ideas that I am truly passionate about with new and interesting people. Recently, I had the privilege of attending an ISACA […]

The Top 7 Questions We Get Asked about CTEM

Originally published by Dazz.Written by Jordan McMahon, Corporate Marketing, Dazz.I’m not ashamed to admit I’m a massive sucker for videos featuring hilarious moments captured by Ring doorbells.Like this one.And this one.And definitely all of these.Round-the-clock monitoring has become essential in our lives. It’s comforting. It’s smart. It’s proactive. And it resonates with cybersecurity practitioners perhaps […]