Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday

Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild.
The post Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday appeared first on SecurityWeek.
Continue reading Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday

Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications.
The post Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader appeared first on SecurityWeek.
Continue reading Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file.
The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared first on … Continue reading How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform. 
The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform  appeared first on SecurityWee… Continue reading SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks.
The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.
Continue reading China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing 

Knostic provides a “need-to-know” filter on the answers generated by enterprise large language models (LLM) tools.
The post Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  appeared first on SecurityWeek.
Continue reading Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing 

Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist

Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist.
The post Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist… Continue reading Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist