Secure chat darling Matrix admits pair of 'high severity' protocol flaws need painful fixes

Source

Foundation warns federated servers face biggest risk, but single-instance users can take their time Updated The maintainers of the federated secure chat protocol Matrix are warning users of a pair of "high severity protocol vulnerabilities," addressed in the latest version, saying patching them requires a breaking change in servers …

Microsoft Patch Tuesday, August 2025 Edition

Source

Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least 13 of the bugs received Microsoft’s most-dire “critical” rating, meaning they could be abused by malware or malcontents to gain remote access to a Windows system with …

Forrester study: Customers cite 240% ROI with Google Security Operations

Source

As part of Google Cloud’s fundamental belief that robust security can enable business resilience and innovation, we're committed to empowering security operations teams with solutions that deliver measurable value and demonstrable return on investment (ROI). That's why we're thrilled to announce a new, in-depth Forrester Consulting Total Economic …

High-severity WinRAR 0-day exploited for weeks by 2 groups

Source

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July …

Malware analysis on AWS: Setting up a secure environment

Source

Security teams often need to analyze potentially malicious files, binaries, or behaviors in a tightly controlled environment. While this has traditionally been done in on-premises sandboxes, the flexibility and scalability of AWS make it an attractive alternative for running such workloads. However, conducting malware analysis in the cloud brings …

Amazon EC2 defenses against L1TF Reloaded

Source

The guest data of AWS customers running on the AWS Nitro System and Nitro Hypervisor is not at risk from a new attack dubbed “L1TF Reloaded.” No additional action is required by AWS customers; however, AWS continues to recommend that customers isolate their workloads using instance, enclave, or function …

Boosting defenders with AI: What’s coming at Security Summit 2025

Source

While AI can help empower defenders, it can also create new security challenges. Those two critical, interconnected themes are driving our announcements and presentations for this year's Google Cloud Security Summit. Join us live for Security Summit 2025 on August 19 to learn about the latest advancements in AI-powered …

Trend Micro offers weak workaround for already-exploited critical vuln in management console

Source

PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro's Apex One endpoint security platform is under active exploitation, the company admitted last week, and there's no patch available.... [...]

« newer articles | page 68 | older articles »