FIDO Security Token YubiKey 5 Vulnerable to Cloning Attacks

https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf A new side-channel vulnerability has been discovered in the YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard. This vulnerability allows attackers...
Research Study: Where’s The Worst Place to Leave Your Secrets

Research Study: Where’s The Worst Place to Leave Your Secrets

What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places Researchers deployed digital tripwires disguised as AWS credentials in various public locations online to see how quickly threat actors would...

ASD Warns of Phishing Emails Targeting Australians

https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued a warning about a new wave of phishing emails impersonating...

Digital Banks: Boon for Customers, Target for Scammers?

https://www.abc.net.au/news/2024-08-29/neobanks-are-being-targeted-by-scammers/104024144 Digital banks have revolutionized the way we manage our finances, offering convenience and accessibility. However, a recent scam case highlights the dark side of this digital...
How Secure Is Open-Source Software?

How Secure Is Open-Source Software?

Open-source software is the building block of modern applications. From web frameworks to encryption tools, these readily available components offer developers a wealth of functionality and accelerate development cycles. However, this convenience comes with a hidden...