Skip to content

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Cybersecurity

Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials

November 16, 2024

A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to extract VPN credentials as part of a modular framework called DEEPDATA. Volexity,…

Cybersecurity

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations

November 15, 2024

Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. Cybersecurity…

Cybersecurity

Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices

November 15, 2024

In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and…

Cybersecurity

Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform

November 15, 2024

Cybersecurity researchers have disclosed two security flaws in Google’s Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate privileges and exfiltrate models from the…

Cybersecurity

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia

November 15, 2024

A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer. The malware…

Cybersecurity

How AI Is Transforming IAM and Identity Security

November 15, 2024

In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into…

Cybersecurity

High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables

November 15, 2024

Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or…

Cybersecurity

Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin

November 15, 2024

Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday.…

Cybersecurity

CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild

November 15, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild. To…

Cybersecurity

Experts Uncover 70,000 Hijacked Domains in Widespread ‘Sitting Ducks’ Attack Scheme

November 14, 2024

Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks to hijack legitimate domains for using them in phishing attacks and investment fraud schemes for…

Posts pagination

1 … 124 125 126 … 128

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Proudly powered by WordPress | Theme: Newsup by Themeansar.