Solana $SOL reputation is turnishing. A poor implementation of Ed25519, a popular digital signature algorithm, has left dozens of cryptography libraries such as Phantom vulnerable to attacks. According to Bloomberg press release, “estimates of the damage vary. Just over $5.2 million in cryptoassets have been stolen so far from more than 7,900 Continue Reading
Apple’s Arm-based M1 silicon vulnerability allows threat actors capability to gain arbitrary code execution on macOS systems. This was recently discovered by researchers at MIT’s Computer Science & Artificial Intelligence Laboratory. It correlates to the hardware-level pointer authentication codes (PAC), which Apple uses to ensure programs attempting to execute code are safe. Continue Reading
A Telegram feed disclosed stolen customer records from MGM Resorts by threat actors. This is an update released on the MGM Resorts breach that was first reported in July 2019. This article provides additional details on the size of the breach and the types of information that were exposed. reference (1) What Continue Reading
It appears the hacking group used social engineering efforts to gather knowledge about their target’s business operations. Okta services are generally used internally for employee identity integrated in the authentication stack, customers have nothing to worry about unless they themselves use Okta.
You always wanted to become a cybersecurity professional and you succeeded in achieving your goal after years of hard work and dedication. Now, you are promoted to the hot seat of a cybersecurity leader in your organization. The first thing you will notice after being promoted to the leadership role is that Continue Reading
ADVERTISEMENT: Learn more