SC Magazine

Novel Ahoi Attacks Could Compromise Confidential VMs

The researchers presented two variations of what they call Ahoi attacks. One of them, dubbed Heckler, involves a malicious hypervisor injecting interrupts to alter data and control flow, breaking the integrity and confidentiality of CVMs.

Using MITRE ATT&CK Framework to Thwart Active Adversaries

Exploited vulnerabilities and compromised credentials are the primary ways active adversaries breach organizations, making patch management and credential security crucial defenses.

Funding Round Secures $20M for Reach Security

The Series A funding was led by new investors Ballistic Ventures and Artisanal Ventures, as well as existing backers Webb Investment Network, Ridge Ventures, and TechOperators.

Qualcomm Chip Vulnerability Enables Remote Attack by Voice Call

Qualcomm has announced a critical vulnerability that could lead to remote attacks on devices using their chipsets. The flaw, tracked as CVE-2023-33025, involves a buffer overflow during VoLTE calls, allowing attackers to execute code remotely.

New York Hospitals’ Patient Data Impacted by Cyberattack

The IT network of New York-based health providers, including HealthAlliance Hospital, Margaretville Hospital, and Mountainside Residential Care Center, was breached for nearly two months, resulting in the compromise of patient data.

What a Failed Attack Against ColdFusion Revealed About Ransomware Tools and Tactics

Following the trail of telemetry left behind, the Sophos researchers found the attackers had left directory listings enabled on the web server hosting their repository of tools. This enabled the researchers to explore the materials.

Cyberattack disrupts major Mississippi health system

Despite the shutdown of certain internal systems following the detection of unusual network activity, SRHS disclosed that workarounds have been implemented to ensure the partial continuation of business operations.

The Emergence of Threat Intelligence-as-a-Service

Managed security services providers (MSSPs) are evolving to offer more advanced technologies and solutions to help organizations manage and make sense of threat intelligence.

Obfuscation Tool 'BatCloak’ Claims to Evade 80% of AV Detection Engines

Researchers warn that tools using the BatCloak component are becoming increasingly popular with adversaries, making the already difficult task of detecting BAT files harder.

PillPack users informed of unauthorized account access

Amazon Pharmacy’s PillPack arm recently began informing a subset of users that their accounts were accessed by an unknown actor. Of the 19,032 hacker accounts, 3,614 contained prescription information.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags