
Category: Threat Intel Reports
-
Solana blockchain’s popular web3.js npm package backdoored to steal keys, funds
#### [Cyber-crime](/security/cyber_crime/)**3** Solana blockchain’s popular web3.js npm package backdoored to steal keys, funds===============================================================================**3** Damage likely limited to those running bots…
-
Announcing the launch of Vanir: Open-source Security Patch Validation
Posted by Hyunkwook Baek, Duy Truong, Justin Dunlap and Lauren Stan from Android Security and Privacy, and Oliver Chang with…
-
The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight
The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight==============================================================================================By [Joe Marshall](https://blog.talosintelligence.com/author/joe-marshall/)Thursday, December…
-
Bypass Bug Revives Critical N-Day in Mitel MiCollab
* [Vulnerabilities -& Threats](/vulnerabilities-threats)* [Сloud Security](/cloud-security)* [Application Security](/application-security)* [Cyber Risk](/cyber-risk)Bypass Bug Revives Critical N-Day in Mitel MiCollab Bypass Bug Revives…
-
Report: Russian authorities seized phone from detainee, infected it with spyware
Image: Unsplash [Suzanne Smalley](/author/suzanne-smalley)December 5th, 2024 Report: Russian authorities seized phone from detainee, infected it with spyware================================================================================Digital forensic researchers released…
-
PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files
#### [Cyber-crime](/security/cyber_crime/)**2** PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files==================================================================================**2** Still unpatched 100+ days later, watchTowr…
-
Library of Congress Offers AI Legal Guidance to Researchers
* [Cyber Risk](/cyber-risk)* [Application Security](/application-security)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Vulnerabilities -& Threats](/vulnerabilities-threats)Library of Congress Offers AI Legal Guidance to Researchers…
-
As Trump vows to remold intel agencies, US spy chief defends current model
Image: Council on Foreign Relations [Martin Matishak](/author/martin-matishak)December 5th, 2024 As Trump vows to remold intel agencies, US spy chief…
-
Hundred of CISCO switches impacted by bootloader flaw
A bootloader vulnerability in Cisco NX-OS affects 100+ switches, allowing attackers to bypass image signature checks.———————————————————————————————————————Cisco released security patches for…
-
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to…

