A recently disclosed vulnerability in the Common Unix Printing System (CUPS) open-source printing system can be exploited by threat actors to launch distributed denial-of-service (DDoS) attacks with a 600x amplification factor. […] Go to Source Author: Sergiu Gatlan
Author Archives: Onsite Computing, Inc.
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other malicious activity. Go to Source Author: Jai Vijayan, Contributing Writer
Ivanti reports that the bug is being actively exploited in the wild for select customers. Go to Source Author: Dark Reading Staff
“Pig butchering,” generative AI, and spear-phishing have all transformed digital warfare. Go to Source Author: Nathan Eddy, Contributing Writer
Fake trading apps on Google Play and Apple’s App Store lure victims into “pig butchering” scams that have a global reach. […] Go to Source Author: Bill Toulas
The national Dutch police (Politie) says that a state actor was likely behind the data breach it detected last week. […] Go to Source Author: Bill Toulas
Although the veto was a setback, it highlights key debates in the emerging field of AI governance and the potential for California to shape the future of AI regulation. Go to Source Author: Debrup Ghosh
Microsoft and the Justice Department have seized over 100 domains used by the Russian ColdRiver hacking group to target United States government employees and nonprofit organizations from Russia and worldwide in spear-phishing attacks. […] Go to Source Author: Sergiu Gatlan
Approximately 5% of all Adobe Commerce and Magento online stores, or 4,275 in absolute numbers, have been hacked in “CosmicSting” attacks. […] Go to Source Author: Bill Toulas
Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that’s responsible for handling all connectivity, such as LTE, 4G, and 5G, with a mobile phone cell […]
