Insights, updates, and deep dives into cybersecurity, cloud technology, and AI innovation.

After the Falcon update caused widespread IT outages, attackers quickly crafted phishing campaigns, posing as CrowdStrike support, to deliver malicious payloads. One notable campaign involves a fraudulent CrowdStrike recovery manual that installs the Daolpu info-stealer.

A recent update to CrowdStrike Falcon caused significant disruptions globally by crashing Windows systems. The update's faulty component led to numerous systems encountering boot loops or the Blue Screen of Death (BSOD).

Law enforcement has a powerful new tool in the fight against child sexual abuse material (CSAM). Researchers identified thousands of CSAM website users by analyzing information stolen by malware. This innovative approach involves cross-referencing stolen login credentials with known CSAM domains. Combined with publicly available information gathering (OSINT), researchers were able to link stolen credentials to real users.

Google is upping the ante on virtual machine security with the launch of kvmCTF, a new bug bounty program. This program specifically targets vulnerabilities within the KVM hypervisor, a technology fundamental to running virtual machines.

A recently discovered vulnerability in OpenSSH servers, designated CVE-2024-6387 and named regreSSHion, poses a significant security risk. This flaw could allow unauthorized actors to remotely execute code on vulnerable systems.

Google recently enhanced Chrome Enterprise Core, a free browser management tool for organizations. These improvements aim to streamline browser control for IT and security teams. While a paid version, Chrome Enterprise Premium, offers advanced security features, Chrome Enterprise Core focuses on configuration and policy management.

Google's Project Naptime tackles cybersecurity through a novel method: AI-powered vulnerability research. Unlike traditional manual code audits, Project Naptime employs a large language model (LLM) to mimic a security researcher.

A cunning malware campaign is targeting users with fake Google Chrome errors, Microsoft Word errors, and even fake OneDrive errors. These deceptive messages aim to trick people into running malicious PowerShell scripts that can infect their devices with malware.

VMware released critical security patches to address remote code execution (RCE) vulnerabilities in vCenter Server. These vulnerabilities could allow attackers to gain full control over affected systems.