Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Red Hat Investigates Widespread Breach of Private GitLab Repositories

A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."

DARKReading
#linux#red_hat#git
Phishing Is Moving From Email to Mobile. Is Your Security?

With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.

'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan

The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.

Android Spyware in the UAE Masquerades as ... Spyware

In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.

Google Sheds Light on ShinyHunters' Salesforce Tactics

Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.

Shutdown Threatens US Intel Sharing, Cyber Defense

Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.

A $50 'Battering RAM' Can Bust Confidential Computing

Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.

Undead Operating Systems Haunt Enterprise Security Networks

Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.

China Imposes One-Hour Reporting Rule for Major Cyber Incidents

The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.

New China APT Strikes With Precision and Persistence

Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.