Nov 04, 2024Ravie LakshmananVulnerability / Cyber Threat Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out … [Read more...] about Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning
Learn Key Identity Security Tactics in This Expert Webinar
Nov 02, 2024The Hacker NewsSaaS Security / Identity Security Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It's a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to … [Read more...] about Learn Key Identity Security Tactics in This Expert Webinar
AI, Fake Hosting, and Psychological Warfare
U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel's participation in the sporting event. The activity has been pinned on an entity that's known as Emennet Pasargad, which the agencies said … [Read more...] about AI, Fake Hosting, and Psychological Warfare
Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned
Nov 01, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and … [Read more...] about Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned
CrowdStrike Earns High Scores in 2024 Gartner Critical Capabilities for Endpoint Protection
This week, Gartner released its 2024 Gartner® Critical Capabilities Report for Endpoint Protection Platforms (EPP) as a companion to last month’s 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We’re proud to share that CrowdStrike received the highest score in both the Core Endpoint Protection and Managed Security Services Use Cases in the 2024 Gartner … [Read more...] about CrowdStrike Earns High Scores in 2024 Gartner Critical Capabilities for Endpoint Protection
New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics
Oct 31, 2024Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. "While the iOS implant delivery method closely mirrors that of the macOS … [Read more...] about New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics
Google Cloud ARM-Based Axion CPU Falcon Support
CrowdStrike is proud to announce cloud security support for Google Cloud’s first custom ARM-based processor, Axion, delivered by the unified, cloud-native CrowdStrike Falcon® platform. This extends industry-leading protection to our customers with extensive coverage for Google Cloud environments. We are excited to collaborate with Google Cloud, which today unveils its new … [Read more...] about Google Cloud ARM-Based Axion CPU Falcon Support
North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, … [Read more...] about North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
New CrowdStrike Research Challenges Container Predictability Assumptions
General-purpose Linux utilities — often observed in living off the land post-exploitation activity — are frequently used in popular containerized applications.CrowdStrike researchers have identified significant variation in the usage patterns of general-purpose Linux utilities across these containerized applications.The findings challenge commonly accepted assumptions about the … [Read more...] about New CrowdStrike Research Challenges Container Predictability Assumptions
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
Oct 29, 2024Ravie LakshmananAI Security / Vulnerability A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported … [Read more...] about Researchers Uncover Vulnerabilities in Open-Source AI and ML Models