Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

QuSecure Carves Out Space in Quantum Cryptography With Its Vision of a Post-RSA World

NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like QuProtect.

DARKReading
#mac#cisco#intel#auth#ibm#ssl
Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

The PyPI "pymafka" package is the latest example of growing attacker interest in abusing widely used open source software repositories.

CVE-2022-1467: Support | Cyber Security Updates

Windows OS can be configured to overlay a “language bar” on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS.

Hunting down your data with Whitney Merrill: Lock and Code S03E11

This week on Lock and Code, we speak with Whitney Merrill about why it is so difficult to get your own data from a company. The post Hunting down your data with Whitney Merrill: Lock and Code S03E11 appeared first on Malwarebytes Labs.

Yes, Containers Are Terrific, But Watch the Security Risks

Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don’t mitigate these risks are vulnerable to attack.  In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture – and what

Valeo Networks Acquires Next I.T.

Next I.T. is the sixth and largest acquisition to date for Valeo Networks.

Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection

IronKey Vault Privacy 80 External SSD safeguards against brute-force attacks and BadUSB with digitally-signed firmware.

iTop Remote Command Execution

iTop versions prior to 2.7.5 authenticated remote command execution exploit.

m1k1o's Blog 1.3 Remote Code Execution

m1k1o's Blog versions 1.3 and below suffer from an authenticated remote code execution vulnerability.

Chicago students lose data to ransomware attackers

A recent breach notification has revealed some 490,000+ students were impacted by a ransomware attack last December. The post Chicago students lose data to ransomware attackers appeared first on Malwarebytes Labs.