Microsoft Cybersecurity Restrictions: Microsoft’s decision to restrict Chinese companies’ access to critical vulnerability data marks a significant shift in cybersecurity information sharing between the United States and China. …
CSC News
-
-
Vulnerabilities & ExploitsNews & Resources
Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack
by CSC Newsby CSC News 2 minutes readApple has confirmed that an ‘extremely sophisticated’ Apple USB Restricted Mode exploit has been used in targeted attacks, potentially putting iPhone and iPad users at risk. Apple Issues …
-
Vulnerabilities & ExploitsNews & Resources
CISA Adds New Exploited jQuery Vulnerability to KEV Catalog
by CSC Newsby CSC News 2 minutes readThe CISA known exploited vulnerabilities update has just included a critical jQuery vulnerability cross-site scripting (XSS) flaw, tracked as CVE-2020-11023, to its catalog. This latest addition highlights the …
-
Data BreachesNews & Resources
Millions Impacted by PowerSchool Data Breach
by CSC Newsby CSC News 2 minutes readA recent PowerSchool data breach has impacted millions of students and staff, raising serious concerns about data privacy and security in schools across the United States. PowerSchool Data …
-
News & ResourcesIoT Security
Understanding the Murdoc Botnet Mirai Variant: How It Exploits IoT Vulnerabilities
by CSC Newsby CSC News 2 minutes readCybersecurity experts are raising alarms about the Murdoc Botnet Mirai Variant, a new and dangerous malware strain targeting Internet of Things (IoT) devices. Leveraging known vulnerabilities in Avtech …
-
News & Resources
Treasury Sanctions Cyber Actors Behind Treasury Network Breach
by CSC Newsby CSC News 2 minutes readTreasury Sanctions Cyber Actors Behind Treasury Network Breach: The Treasury has sanctioned cyber actors responsible for the recent breach of the Department of the Treasury’s network infrastructure. This …
-
News & ResourcesNation-State Attack
North Korea IT Sanctions: U.S. Sanctions Target DPRK IT Network Funding Weapons Programs
by CSC Newsby CSC News 2 minutes readThe recent North Korea IT sanctions imposed by the U.S. Treasury aim to curb illicit activities funding weapons programs in the Democratic People’s Republic of Korea (DPRK). These …
-
News & ResourcesData Breaches
European Data Transfer to China: TikTok, AliExpress, SHEIN & Co Accused
by CSC Newsby CSC News 2 minutes readThe issue of European data transfer to China has sparked significant concern among privacy advocates and legal experts. Noyb filed six GDPR complaints against TikTok, AliExpress, SHEIN, Temu, …
-
MalwareCryptocurrencyNation-State AttackNews & Resources
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles
by CSC Newsby CSC News 2 minutes readThe Lazarus Group targets Web3 developers in a chilling new cyber campaign known as Operation 99. By posing as recruiters with fake LinkedIn profiles, North Korea’s state-sponsored hacking …
-
Vulnerabilities & ExploitsNews & Resources
Critical Zoom Security Bulletin Highlights Multiple Vulnerabilities
by CSC Newsby CSC News 1 minutes readZoom has recently issued a critical Zoom security bulletin, shedding light on several vulnerabilities across its Workplace Apps for Linux, macOS, Windows, and other platforms. These issues, if …