information security
-
The Economics of Cybersecurity in Emerging Markets
Digitization has brought enormous economic and social benefits, but our growing reliance on digital technologies also poses significant risks. This is also the case in developing countries, where the pace of digitization often outstrips the necessary investment and attention required to build cyberresilience, which can lead to debilitating consequences.
-
National security: cyberwarfare methodology and case studies
In the context of evolving modern conflicts, cyberwarfare methodologies have become a powerful tool in the arsenal of states, hacktivists and cybercriminals. This paper provides a comprehensive analysis of the methodologies employed in the field of cyber warfare. By delving into techniques, strategies and tactics, we aim to reveal the multifaceted nature of cyber warfare.
-
KEV directory released 6 exploited vulnerabilities , involving Apple, Apache, Adobe, D-Link, Joomla!
The U.S. Cybersecurity and Infrastructure Security Administration (CISA) released six exploited vulnerabilities involving vendors Apple, Apache, Adobe, D-Link, Joomla! and others, and the CVE-2023-41990 vulnerability has been fixed by Apple, but is still being exploited by unknown attackers. It is recommended to affected to carry out vulnerability fixes to protect their network security.
-
Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset
The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.
-
Orbit Bridge Cryptocurrency Losses Up to $82 Million in Hacking Attacks
On New Year's Eve 2024, Orbit Bridge was hit by a massive hack that cost over $82 million. The incident sparked panic in the crypto community and highlighted once again the importance of cryptocurrency security.
-
The rise of ransomware as a service (RaaS) users face more severe threats
In the evolving world of cybersecurity, ransomware attacks have become a serious and widespread threat. Among the different forms of ransomware, a trend called Ransomware-as-a-Service (RaaS) is becoming increasingly prominent. This worrying development changes the cybercrime landscape, enabling individuals with limited technical capabilities to carry out destructive attacks.
-
Data security: How does generative AI deal with security risks and challenges?
The development and application of AI are having a major impact on the scientific and technological field and may trigger a new productivity revolution. As a powerful technology, AI gives computer systems the ability to generate human language content.
-
Open source browser engine WebKit arbitrary file reading vulnerability
Google Chrome is a web browser developed by Google. It is based on an open source kernel (such as WebKit) and aims to improve stability, speed and security, with a simple and efficient interface. However, by using XSL stylesheets and external entity references in SVG image links, an attacker can read arbitrary files on the victim's computer.