V8 Sandbox, a new defense against browser attacks, by Google Chrome
April 10, 2024
To address memory corruption issues, Google has announced support for the so-called V8 Sandbox in the Chrome web browser. Samuel Groß, the technical lead for V8 security, states that the sandbox is intended to stop “memory corruption in V8 from spreading within the host process.”…
0 Comments5 Minutes
“Latrodectus”: Is This Malware Lurking in Your Email?
April 10, 2024
Latrodectus is a new strain of malware recently discovered by threat researchers. It has been distributed through email phishing campaigns since at least late November 2023. In a recent collaborative analysis by experts from Proofpoint and Team Cymru, it was revealed that Latrodectus functions as a…
0 Comments5 Minutes
Deep Dive into Cybersecurity Breach Prevention
Managed Detection And Response
April 5, 2024
In an era where digital threats loom around every virtual corner, understanding and preventing a cybersecurity breach has never been more crucial. It’s not just about the tech-savvy elite; this is a call to action for everyone, from individuals to corporate giants. So, buckle up as we embark…
2 Comments12 Minutes
Cyber Security Programs: Your First Step Towards a Secure Future
Managed Detection And Response
April 4, 2024
The landscape of cyber security programs is as vast as it is critical. These programs range from formal degrees and certifications to bootcamps and online courses, each designed to equip individuals with the skills needed to combat digital threats. But it’s not just about learning to fight…
0 Comments9 Minutes
In “Incognito Mode,” Google will remove billions of browsing records.
April 2, 2024
As part of the settlement of a class action lawsuit, Google has agreed to delete billions of data records that show users’ browsing activity without their knowledge or consent while using its Chrome browser. The class action lawsuit, filed in 2020, claimed that the firm had deceived consumers…
0 Comments4 Minutes
ZenHammer Attack Gets Around AMD CPUs’ Rowhammer Defenses
Emergency Response & Forensics
March 28, 2024
For the first time, ETH Zurich cybersecurity researchers have created a new version of the RowHammer DRAM (dynamic random-access memory) ZenHammer Attack that is effective against AMD Zen 2 and Zen 3 systems even in the face of mitigations like Target Row Refresh (TRR). “This result proves…
0 Comments6 Minutes
Microsoft SharePoint Vulnerability Under Attack by Hackers
Emergency Response & Forensics
March 27, 2024
The United States Cybersecurity and Infrastructure Security Agency (CISA) has recently flagged a critical security flaw impacting the Microsoft SharePoint Server, escalating it to the Known Exploited Vulnerabilities (KEV) list. This move comes in response to compelling evidence indicating ongoing…
0 Comments4 Minutes
The Role of a Cybersecurity Specialist
Managed Detection And Response
March 27, 2024
A cybersecurity specialist is tasked with the ongoing responsibility of identifying, monitoring, and countering cyber threats. These professionals are not just observers; they actively design, implement, and maintain robust security systems to protect sensitive data from cyber-attacks. Without…
2 Comments8 Minutes
CISA Alerts: Flaws in Fortinet, Ivanti, & Nice Products Exploited
Emergency Response & Forensics
March 26, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently expanded its Known Exploited Vulnerabilities (KEV) list, highlighting three critical security flaws. This update comes with a warning, as evidence suggests these vulnerabilities are actively being exploited. The following are…
0 Comments4 Minutes
Apple M-Series Chips’ New “GoFetch” Vulnerability Exposes Secret Encryption Keys
Emergency Response & Forensics
March 25, 2024
The vulnerability, dubbed GoFetch, is related to a microarchitectural side-channel attack that targets constant-time cryptographic implementations and retrieves sensitive data from the CPU cache by utilizing a feature called data memory-dependent prefetcher (DMP). The results were communicated to…
0 Comments7 Minutes