Feb 14, 2024NewsroomSoftware Security / Vulnerability Cybersecurity researchers have found that it’s possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems running Ubuntu operating system. “While ‘command-not-found’ serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by…
Read MoreImproving the Cryptanalysis of Lattice-Based Public-Key Algorithms The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis. This is important, because a bunch of NIST’s post-quantum options base their security on lattice problems. I worry about standardizing on post-quantum algorithms too quickly. We are still learning a…
Read MoreUndoubtedly, Google Chrome is the most popular web browser, holding the highest market share. But Mozilla Firefox is close enough. With a market share of 2.77%, Mozilla’s Firefox rounds out the top six web browsers in the globe. In other words, Firefox is an excellent alternative to Google Chrome. However, although Firefox has many standalone…
Read MoreFeb 14, 2024NewsroomMalware / Cybercrime The infamous malware loader and initial access broker known as Bumblebee has resurfaced after a four-month absence as part of a new phishing campaign observed in February 2024. Enterprise security firm Proofpoint said the activity targets organizations in the U.S. with voicemail-themed lures containing links to OneDrive URLs. “The URLs…
Read MoreERR_SSL_PROTOCOL_ERROR sometimes occurs when users visit your website. Here is a guide on What is ERR_SSL_PROTOCOL_ERROR and how to fix ERR_SSL_PROTOCOL_ERROR. In 2023 cyberattacks have increased and more than 519,111,354 data records have been exposed. SSL certificates can help businesses to ensure secure communication between server and browser so there are no data breaches. However,…
Read MoreThe landscape of cybersecurity in financial services is undergoing a rapid transformation. Cybercriminals are exploiting advanced technologies and methodologies, making traditional security measures obsolete. The challenges are compounded for community banks that must safeguard sensitive financial data against the same level of sophisticated threats as larger institutions, but often with more limited resources. The FinServ…
Read MoreThe Varta Group was the target of a cyberattack on parts of its IT systems on the night of Feb. 12, the battery manufacturer has announced. Five production plants and the company’s administration were affected. “The IT systems and thus also production were proactively shut down temporarily for security reasons and disconnected from the internet,”…
Read MoreFeb 14, 2024NewsroomZero-Day / Financial Sector Security A newly disclosed security flaw in the Microsoft Defender SmartScreen has been exploited as a zero-day by an advanced persistent threat actor called Water Hydra (aka DarkCasino) targeting financial market traders. Trend Micro, which began tracking the campaign in late December 2023, said it entails the exploitation of…
Read MoreFor decades, the financial sector and other industries have relied on an authentication mechanism dubbed “know your customer” (KYC), a process that confirms a person’s identity when opening account and then periodically confirming that identity overtime. KYC typically involves a potential customer providing a variety of documents to prove that they are who they claim…
Read MoreDigital Security As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern 13 Feb 2024 • , 5 min. read Fake news has dominated election headlines ever since it became a big story during the race for the White…
Read More