CloudSek launches free security tool that helps users win bug bounty
Cybersecurity firm CloudSek has launched BeVigil, a tool that can tell users how safe the apps installed on their phone are, and helps users and developers win bug bounty...
Touch and smell comes to the metaverse, Nifty Newsletter, Jan 4–10
In this week’s newsletter, read about how the metaverse may integrate touch and smell. Check out how the nonfungible token (NFT) project Moonbirds plans to become a global brand...
Better Phishing, Easy Malicious Implants: How AI Could Change Cyberattacks
Artificial intelligence and machine learning (AI/ML) models have already shown some promise in increasing the sophistication of phishing lures, creating synthetic profiles, and creating rudimentary malware, but even more...
98 Patches: Microsoft Greets New Year With Zero-Day Security Fixes
Microsoft's first security update for 2023 contained patches for a whopping 98 vulnerabilities, including one that attackers are actively exploiting and another that is publicly known but has not...
Open-source tech leaders urge new Congress to prioritize privacy in blockchain regulation
Written by Tonya Riley Jan 10, 2023 |...
Vade Releases Advanced Threat Intel & Investigation Capabilities
SAN FRANCISCO, Jan. 10, 2023 /PRNewswire/ -- Vade, the global leader in threat detection and response with 1.4 billion mailboxes protected, today announced the availability of Threat Intel & Investigation. An add-on...
5 sneaky tricks crypto phishing scammers used last year: SlowMist
Blockchain security firm SlowMist has highlighted five common phishing techniques crypto scammers used on victims in 2022, including malicious browser bookmarks, phony sales orders and Trojan malware spread on...
Attackers Are Already Exploiting ChatGPT to Write Malicious Code
Since OpenAI released ChatGPT in late November, many security experts have predicted it would only be a matter of time before cybercriminals began using the AI chatbot for writing...
JsonWebToken Security Bug Opens Servers to RCE
A high-severity vulnerability (CVE-2022-23529) has been discovered in the popular JsonWebToken (JWT) open source encryption project, which could be used by attackers to achieve remote code execution (RCE) on...
‘Copyright Infringement’ Lure Used for Facebook Credential Harvesting
An extensive credential-harvesting campaign has hackers leveraging Facebook copyright infringement notices to steal enterprise credentials.Malicious actors continue to use tried and true phishing techniques and social engineering tactics to...