by Liquid Video Technologies | Mar 15, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Researchers have discovered a new side-channel that they say can be reliably exploited to leak information and tracking users from web browsers that could then be leveraged to track users even when JavaScript is completely disabled. “This is a side-channel...
by Liquid Video Technologies | Mar 12, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
Cybercriminals are now deploying remote access Trojans (ObliqueRAT) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed...
by Liquid Video Technologies | Mar 10, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Microsoft has released emergency patches to address four previously undisclosed security flaws in Exchange Server that it says are being actively exploited by a new Chinese state-sponsored threat actor with the goal of perpetrating data theft. Describing the attacks...
by Liquid Video Technologies | Mar 5, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry through ThreatNeedle malware. Attributing the attacks with high confidence to...
by Liquid Video Technologies | Mar 3, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Called CNAME Cloaking, the practice of blurring the distinction between first-party and third-party cookies not only results in leaking sensitive private information without users’ knowledge and consent but also “increases [the] web security threat...
by Liquid Video Technologies | Mar 1, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
Called “Shadow attacks” by academics from Ruhr-University Bochum, the technique uses the “enormous flexibility provided by the PDF specification so that shadow documents remain standard-compliant.” The findings were presented yesterday at the...
Recent Comments