by Beck Bailey | Jun 27, 2023 | RSS
A new process injection technique dubbed Mockingjay could be exploited by threat actors to bypass security solutions to execute malicious code on compromised systems. “The injection is executed without space allocation, setting permissions or even starting a...
by Beck Bailey | Jun 27, 2023 | RSS
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution chain to deliver an unknown payload to targeted systems. “The packages in question seem to be published in pairs, each pair working in...
by Beck Bailey | Jun 27, 2023 | RSS
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution chain to deliver an unknown payload to targeted systems. “The packages in question seem to be published in pairs, each pair working in...
by Beck Bailey | Jun 27, 2023 | RSS
Cloud data security company Fortanix has announced Fortanix Confidential Data Search, a search offering for encrypted databases within enterprise cloud workflows.“Confidential Data Search allows data analysts to use off-the-shelf, unmodified databases in a standard,...
by Beck Bailey | Jun 27, 2023 | RSS
Application security posture management (ASPM) company Bionic has added two new capabilities — Bionic Signals and Bionic Business Risk Scoring — to its namesake cybersecurity platform to help its customers detect, prioritize and remediate vulnerabilities and threats...
Recent Comments