Navigating the Shadows: Safeguarding AI Infrastructure Amidst CVE-2023-48022

Originally published by Truyo.We all want to leverage AI, but models are only as good as the data used to train them. Often, training data is comprised of confidential information. How do you balance the need to make an AI run effectively without exposing PII? It’s not only the initial training that could be exposing […]

New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to elevate a limited heap vulnerability to an arbitrary memory read-and-write primitive. “Initially, it exploits a timing side-channel of the allocator to perform a cross-cache attack reliably,” a group of academics from the Graz University of Technology […]

Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to execute malicious JavaScript in a victim’s web browser and steal sensitive information from their account under specific circumstances. “When a victim views a malicious email in Roundcube sent by an attacker, the attacker can execute arbitrary JavaScript […]

The Hydra Effect: Why Shutting Down RaaS is Like Playing Whack-a-Mole

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.As a CISO in Residence, one of my favorite activities is presenting on various topics at regional security summits. It lets me share ideas that I am truly passionate about with new and interesting people. Recently, I had the privilege of attending an ISACA […]

The Top 7 Questions We Get Asked about CTEM

Originally published by Dazz.Written by Jordan McMahon, Corporate Marketing, Dazz.I’m not ashamed to admit I’m a massive sucker for videos featuring hilarious moments captured by Ring doorbells.Like this one.And this one.And definitely all of these.Round-the-clock monitoring has become essential in our lives. It’s comforting. It’s smart. It’s proactive. And it resonates with cybersecurity practitioners perhaps […]

New Go-based Backdoor GoGra Targets South Asian Media Organization

An unnamed media organization in South Asia was targeted in November 20233 using a previously undocumented Go-based backdoor called GoGra. “GoGra is written in Go and uses the Microsoft Graph API to interact with a command-and-control (C&C) server hosted on Microsoft mail services,” Symantec, part of Broadcom, said in a report shared with The Hacker […]

CrowdStrike Reveals Root Cause of Global System Outages

Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor software update crash that crippled millions of Windows devices globally. The “Channel File 291” incident, as originally highlighted in its Preliminary Post Incident Review (PIR), has been traced back to a content validation issue that arose after it introduced a new Template […]

Best Basilisk Alternative – 8 High-Quality Options

If you’re looking for the Basilisk alternative, I’ve tested numerous browsers that might be a good replacement. I’ve been using Basilisk for some time because of its simplicity and customization. However, I recently felt it lacks in privacy features and advanced settings. Due to this, I was forced to look for other better options. That’s […]