Tag: Flags
-
GitHub and the Ekoparty 2023 Capture the Flag
As an Ekoparty 2023 sponsor, GitHub once again had the privilege of submitting several challenges to the event’s Capture The Flag (CTF) …
-
Online Dating: Cybercrime Red Flags
Online dating is not a new phenomenon; however, scammers have found ways to exploit it for various purposes, such as stealing victims’ …
-
Microsoft Defender Flags Tor Browser as Win32/Malgent!MTB Malware
The detection of Tor browser’s latest version as Win32/Malgent!MTB malware is likely a false positive. Microsoft Defender, a popular …
-
Operation Rusty Flag: Azerbaijan Targeted in New Rust-Based Malware Campaign
Targets located in Azerbaijan have been singled out as part of a new campaign that’s designed to deploy Rust-based malware on compromised …
-
5 Examples of DNS IoCs That Are Red Flags for Cyberattacks
In the increasingly digitalized world that we live in, doing business without being connected 24/7 is almost unthinkable. Any medium to …
-
FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers
Between Monday and Tuesday, the FBI has traced approximately 1580 stolen Bitcoins, valued at over $40m, which may soon be cashed out by …
-
Xiaomi Mi Phones Flags Telegram as Malicious App
Xiaomi, the Asian smartphone giant, has implemented measures within its MIUI operating system that flag Telegram as a malicious app. This …
-
OWASP Lead Flags Gaping Hole in Software Supply Chain Security
BLACK HAT USA – Las Vegas – Wednesday, Aug. 9 The founder and lead of the open-source OWASP’s dependency-check project has devised what …
-
Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events
Microsoft is warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber risk surface of live sporting …
-
Instagram Flags AI-Generated Content
Instagram appears to be implementing a feature that would label social media posts created by ChatGPT and other artificial intelligence as …
-
CISA Flags 8 Actively Exploited Flaws in Samsung and D-Link Devices
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a set of eight flaws to the Known Exploited Vulnerabilities …
-
Vetting an Open Source Database? 5 Green Flags to Look For
By now, the vast majority of companies (90%, according to a report from GitHub) use open source in some way. The benefits are …
●●●