‘HybridPetya’ Ransomware Bypasses Secure Boot – Dark Reading
The malware, which has traits of Petya ransomware and the infamous NotPetya wiper, is designed to target UEFI-based systems, according to researchers. – Read More
The malware, which has traits of Petya ransomware and the infamous NotPetya wiper, is designed to target UEFI-based systems, according to researchers. – Read More
The ransomware gang breached a “major element” of the healthcare technology supply chain and stole sensitive patient data, according to researchers. – Read More
The FBI’s IC3 recently warned of two threat actors, UNC6040 and UNC6395, targeting Salesforce customers, separately and in tandem. – Read More
CISA’s Secure by Design planted a flag. Now, it’s on those who care about safeguarding systems to pick up the torch and take action to secure systems throughout the enterprise.…
Researchers convince Anthropic’s AI-assisted coding tool to engage in dangerous behavior by lying to it, paving the way for a supply chain attack. – Read More
CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. – Read More
Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and…
The US Transportation Department reportedly warns that solar-powered devices used in highway infrastructure have undocumented radios. Is the risk real? – Read More
The data leak underscores the larger issue of proprietary or sensitive data being shared with GenAI by users who should know better. – Read More
By weaponizing the ThrottleStop.sys driver, attackers are disrupting antivirus and endpoint detection and response (EDR) systems. – Read More
Even when a vulnerability is serious and a fix is available, actually securing cars is more difficult than one would hope. – Read More
F5 plans to use CalypsoAI’s platform to provide real-time threat defense against attacks and help enterprises safeguard themselves as they adopt the latest AI technologies. – Read More
With legit sounding names, EvilAI’s “productivity” apps are reviving classic threats like Trojans while adding new evasion capabilities against modern antivirus defenses. – Read More
The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to researchers. – Read More
Researchers say a likely Russian APT used a compromised employee email account to attack Kazakhstan’s biggest company, though the oil and gas firm claims it was a pen test. –…