This is the fourth in our series of blogs about the quantum threat. Our most recent post, The Impacts of Government Regulations on PQC Product Availability, discussed government standards for Post-Quantum Computing (PQC) and their impact on PQC adoption. As a diverse collection of stakeholders anticipates the maturing of PQC, the risks of Q-Day and Harvest Now, Decrypt Later … [Read more...] about Quantum Key Distribution & the Path to Post-Quantum Computing
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called ValleyRAT. The malware, first detected in 2023, is attributed to a threat actor tracked as Silver Fox, with prior attack campaigns primarily targeting Chinese-speaking regions like Hong Kong, Taiwan, … [Read more...] about Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
New Orleans students showcase their creativity with iPad and Mac
February 3, 2025 UPDATE New Orleans students showcase their creativity with iPad and Mac With all eyes on New Orleans, Apple community partners Ellis Marsalis Center for Music and Arts New Orleans put the city’s aspiring young artists in the spotlight On a drizzly, overcast afternoon, all is quiet at the intersection of Bartholomew and Prieur streets in New Orleans’ … [Read more...] about New Orleans students showcase their creativity with iPad and Mac
Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
Feb 05, 2025Ravie LakshmananCryptocurrency / Data Breach The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems. According to cybersecurity company Bitdefender, the scam begins with a message … [Read more...] about Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
Inside CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections
Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks and their users, and locate system vulnerabilities, without setting off alarms. Proactive monitoring and early detection of this activity can disrupt attackers in their tracks and … [Read more...] about Inside CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections
Introducing Apple Invites, a new app that brings people together
February 4, 2025 PRESS RELEASE Introducing Apple Invites, a new app that brings people together for life’s special moments CUPERTINO, CALIFORNIA Apple today introduced Apple Invites, a new app for iPhone that helps users create custom invitations to gather friends and family for any occasion. With Apple Invites, users can create and easily share invitations, RSVP, contribute … [Read more...] about Introducing Apple Invites, a new app that brings people together
Behind the scenes of Elastic Security’s generative AI features
A quantitative approach to prompt tuning and LLM evaluationElastic has long been developing machine learning (ML) and AI-powered security detections. We constantly bring in new technologies when available to help make our users’ lives easier. So, with the rise of generative AI (GenAI), we have developed even more Elastic Security features to use this powerful, new technology. … [Read more...] about Behind the scenes of Elastic Security’s generative AI features
University of Sunderland Proactively Defends With CrowdStrike
In 2021, the University of Sunderland experienced a devastating ransomware attack that disrupted its services and highlighted vulnerabilities in its security posture. With over 28,000 students relying on its network, the university needed to quickly recover and ensure such an incident wouldn’t happen again. Enter CrowdStrike. CrowdStrike’s Incident Response team worked … [Read more...] about University of Sunderland Proactively Defends With CrowdStrike
Cybersecurity for Businesses of All Sizes
One of the primary reasons why cybersecurity remains a complex undertaking is the increased sophistication of modern cyber threats. As the internet and digital technologies continue to advance, so do the methods and tools cybercriminals use. This means that even the most secure systems are vulnerable to attacks over time. Detecting and preventing these attacks require constant … [Read more...] about Cybersecurity for Businesses of All Sizes
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Feb 04, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems. The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module … [Read more...] about Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access