Cyberattack Disrupts Transport for London Services

https://tfl.gov.uk/campaign/cyber-security-incident Transport for London (TfL) has been impacted by a cyberattack, causing disruptions to staff systems and limited availability of services for passengers. The attack occurred on Sunday, prompting TfL to implement...
5 Steps for Securing Your Software Supply Chain

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...

AI-Powered Voice Cloning Scams on the Rise

https://www.sans.org/newsletters/ouch/phantom-voices-defend-against-voice-cloning-attacks A disturbing new trend has emerged in the world of scams – the use of artificial intelligence (AI) to clone voices and deceive unsuspecting victims. Margaret, a retired teacher,...

Critical Vulnerability Found in Airport Security System

https://ian.sh/tsa A significant security flaw has been discovered in FlyCASS, a web-based service used by some airlines to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). The vulnerability could have potentially allowed...

FIDO Security Token YubiKey 5 Vulnerable to Cloning Attacks

https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf A new side-channel vulnerability has been discovered in the YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard. This vulnerability allows attackers...