Hardware security keys under the attack

Hardware security keys under the attack, Google titan security in question

While too many people still don’t know anything about Hardware security keys, such as those from Google and Yubico, Companies are trying to introduce them as the most secure hardware ever. Although these tools are highly resistant to phishing and takeover attacks, the new attacks could let hackers Clone Hardware security keys. An electromagnetic side-channel…

What do Crowdsourced cybersecurity experts recommend?                                                                                                                                 

Crowdsourced Cybersecurity warned SolarWinds users about SUPERNOVA Malware

Lack of crowdsourced cybersecurity has made SolarWinds Orion vulnerable against a zero-day vulnerability on the authentication bypass section. The vulnerability that may make it possible to deploy the SUPERNOVA malware in target environments. Regardless of the reasons such as lack of crowdsourced cybersecurity contributing to this vulnerability, let us read what exactly Carnegie Mellon University…

General Electric (GE) - Canon Data breach

General Electric Information Exposed Through Canon Data Breach

Tech giant, General Electric (GE), disclosed a data breach that exposed current and former employees as well as beneficiaries personally identifiable information (PII). The data breach was uncovered through a security incident that happened to one of GE’s partners, Canon Business Process Services. General Electric Company (GE) is a multinational digital industrial conglomerate. The company…

Cisco vulnerabilities

Cisco Addresses High-Severity Vulnerabilities In Its Products

Cisco has issued security patches for vulnerabilities in its products, eight of which considered having a potentially high impact and the remainder rated medium. The vulnerabilities exist in Cisco products, including the Unified Computing System (UCS) software, Firepower firewall (FXOS), and the Nexus switch operating system (NX-OS) software.  “All six vulnerabilities have a Security Impact Rating (SIR)…

ObliqueRAT, Maldocs

ObliqueRAT Attacks Organizations in Southeast Asia Using Maldocs

ObliqueRAT, a new remote access Trojan (RAT), is delivered to targeted organizations in southeast Asia via malicious Microsoft Office documents (maldocs), Cisco Talos says. Cisco Talos researchers have discovered a new malicious RAT tracked as ObliqueRAT which seems to be developed to attack government organizations and diplomatic targets particularly organizations in southeast Asia. The ongoing…

CDPwn

Cisco CDPwn vulnerabilities affect impact millions of enterprise devices

Cybersecurity provider Armis Security Inc. has disclosed five critical vulnerabilities in a Cisco Systems Inc. networking protocol. The vulnerabilities could allow hackers to target millions of enterprise devices worldwide, from data center switches to conference phones. CDP is a Cisco proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco…