chief security officer
-
The Russian Matrix: Revealing the Operations of Wazawaka and its Cyber Extortion Gang
Cybersecurity researchers have revealed the inner workings of a ransomware operation led by Mikhail Pavlovich Matveev, a Russian citizen who was indicted by the U.S. government earlier this year on charges that he engaged in...
-
Crypto wallet Ledger supply chain vulnerability led to the theft of $600,000 in virtual assets
A supply chain attack on crypto hardware wallet manufacturer Ledger resulted in the theft of $600,000 in crypto assets. The attacker obtained Ledger's npm account through a phishing attack on a resigned employee, and uploaded a malicious version of the Connect Kit module. These malicious versions spread cryptocurrency-stealing malware to other applications that rely on the module, creating software supply chain vulnerabilities.
-
Revealing Third-Party SDK Vulnerabilities: A Practical Guide to Mobile APP Application Security Attack and Defense
This article introduces the actual vulnerability mining of mobile APP third-party SDK conducted by security researchers Li Bo and Zhang Xin of 360 Vulpecker Team. 360 Vulpecker Team focuses on the field of Android system and application security attack and defense, and has a self-developed automated system for Android application security auditing. This article starts from the security status of third-party SDKs, discusses the security risks brought by SDK integration, and introduces in detail the vulnerability risks and attack methods of different SDKs. The vulnerability exploitation methods of push SDK and sharing SDK are analyzed through examples, and the scope of impact of relevant vulnerabilities on applications is pointed out. Finally, some thoughts are put forward to arouse readers' attention and in-depth thinking on the security of mobile APPs.
-
Emergency notification: Apache Struts2 high-risk vulnerability exposes remote code execution vulnerability - upgrade immediately
Apache Struts code execution vulnerability (CVE-2023-50164) allows attackers to control file upload parameter execution path traversal, and in some cases can upload malicious files to execute arbitrary code.
-
North Korean hacker group Lazarus Group launches new cyber attack operation
Recently, a global attack campaign launched by the notorious North Korea-linked cyber threat group "Lazarus Group" was disclosed. This operation was named "Operation Blacksmith" and was characterized by exploiting the Log4j vulnerability (CVE-2021-44228, also known as Log4Shell) to deploy a previously unknown remote access Trojan (RAT) on target systems.
-
The rise of ransomware as a service (RaaS) users face more severe threats
In the evolving world of cybersecurity, ransomware attacks have become a serious and widespread threat. Among the different forms of ransomware, a trend called Ransomware-as-a-Service (RaaS) is becoming increasingly prominent. This worrying development changes the cybercrime landscape, enabling individuals with limited technical capabilities to carry out destructive attacks.
-
WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability
WordPress has released version 6.4.2, which contains a patch for a critical security vulnerability that could be exploited by threat actors to combine it with another vulnerability to execute arbitrary PHP code on vulnerable websites.
-
Data security: How does generative AI deal with security risks and challenges?
The development and application of AI are having a major impact on the scientific and technological field and may trigger a new productivity revolution. As a powerful technology, AI gives computer systems the ability to generate human language content.
-
Gemini: A large model that leads the era of artificial intelligence to surpass ChatGPT is released!
The launch of Google Gemini, a large artificial intelligence model, surpasses chatgpt in all aspects. It is the largest and most powerful artificial intelligence model so far, and it is also the most flexible model so far.
-
AIGC Security: Preventing Microsoft Copilot Data Leakage Risks
Microsoft Copilot is known as one of the most powerful productivity tools on the planet.
Copilot is an artificial intelligence assistant built into every one of your Microsoft 365 applications (Word, Excel, PowerPoint, Teams, Outlook, and more). Microsoft's dream is to eliminate the drudgery of daily work and free humans to focus on being creative problem solvers.