A threat actor has breached the internal systems of F5, Inc. (F5), a prominent American technology firm specializing in application security and delivery. In a disclosure filed with the U.S. Securities and Exchange Commission, F5 attributed the intrusion to a “highly sophisticated nation-state threat actor” who maintained long-term, persistent access to critical company environments. The
Read MoreSonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said. It also noted that it’s working
Read MoreA research team at the University of California, Irvine (UCI) has uncovered a startling way to turn one of the most ordinary pieces of computer hardware, a mouse into a covert listening device. Not a member, read full article here: https://medium.com/tech-waves/your-gaming-mouse-could-be-spying-on-you-the-alarming-mic-e-mouse-ai-attack-that-listens-through-4f812b8dc6b3?sk=febd00cc6bae8f0b8f9b18c3e40d912c Their project, aptly named Mic-E-Mouse, demonstrates that the sensors in high-performance optical mice can pick up minute vibrations from a
Read MorePhishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now, researchers at ANY.RUN has uncovered a new entrant: Salty2FA, a phishing kit designed to bypass multiple two-factor authentication methods and slip past traditional defenses. Already spotted in campaigns across the US and EU, Salty2FA puts enterprises at risk by targeting industries
Read More