U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns
Jan 04, 2025Ravie LakshmananCyber Espionage / IoT Botnet The U.S. Treasury Department's…
LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
Jan 03, 2025Ravie LakshmananWindows Server / Threat Mitigation A proof-of-concept (PoC) exploit…
New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60%
Jan 03, 2025Ravie LakshmananMachine Learning / Vulnerability Cybersecurity researchers have shed light…
Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT
Cybersecurity researchers have discovered a malicious package on the npm package registry…
Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
Jan 02, 2025Ravie LakshmananVulnerability / Data Protection Details have emerged about three…
Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department's…
New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
Jan 01, 2025Ravie LakshmananWeb Security / Vulnerability Threat hunters have disclosed a…
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory…
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
Dec 31, 2024Ravie LakshmananVulnerability / Incident Response The United States Treasury Department…


