The Latest in IT Security

1

A sneaky macOS backdoor that allows attackers to remotely control infected machines has been hiding in trojanized applications for the platform that are hosted on Chinese websites. The “.fseventsd” binary bears some resemblance to known malware baddies, but adds a new layer of stealth that sets it apart. Researchers from Jamf Threat Labs discovered the […]

Read more ...

1

Google released an emergency fix for the first zero-day vulnerability of the year in its Chrome web browser, warning that the bug is under active exploitation. The Silicon Valley giant disclosed limited details Tuesday in an advisory detailing little about the vulnerability, tracked as CVE-2024-0519, other than saying it is an out-of-bounds memory access flaw […]

Read more ...

1

The U.S. Cybersecurity and Infrastructure Security Agency is sounding the alarm on the mounting popularity of Chinese-manufactured unmanned aircraft systems, warning that Sino drones could pose serious risks to American critical infrastructure sectors. The nation’s cyber defense agency published joint guidance Wednesday with the FBI detailing how “the use of Chinese-manufactured UAS in critical infrastructure […]

Read more ...


Categories

SUNDAY, JUNE 08, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments