Tag: Distributions
-
Data Distribution in Privacy-Preserving Federated Learning
This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK …
-
“TicTacToe Dropper” Malware Distribution Tactics Revealed
A recent study conducted by the FortiGuard team has shed light on a sophisticated malware distribution strategy observed throughout 2023. …
-
SandboxAQ’s Jen Sovada, Robert Williams Announce Carahsoft Partnership for Public Sector Distribution of Cyber, Quantum Products
SandboxAQ President of Global Public Sector Jen Sovada and Head of Global Channels Robert Williams announced that their company has entered …
-
Hackers Exploit QR Codes with QRLJacking for Malware Distribution
QRLJacking tricks you with fake QR codes to log into fake websites or apps, while Quishing uses QR codes to deceive you into visiting …
-
Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library’s ld.so dynamic loader that, if …
-
PDF Malware Distribution Has Increased by 500%, as Reported by VirusTotal
A new edition of the “VirusTotal Malware Trends Report” series, which focuses mostly on “Emerging Formats and Delivery Techniques,” …
-
Implications of Pirated Windows 10 in Clipper Malware Distribution
Pirated editions of Windows 10 have been recently associated with the dissemination of clipper malware, according to a study conducted by …
-
Distribution of novel Chromeloader variant facilitated by pirated content-hosting sites
Malicious websites hosting pirated movies, music, or video games have been leveraged to distribute the new variant of the ChromeLoader …
-
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
: Malicious actors can use a fake wextract.exe to gain remote access to a victim’s computer. They can use the modified wextract.exe to …
-
Cyberpress Launches Cybersecurity Press Release Distribution Platform
, a press release distribution platform for the cybersecurity industry, has opened its doors today. This newswire service provides an …
-
ScarCruft’s Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques
The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to …
-
Identity Distribution Is Essential for Modern API Security
Behind today’s APIs, it’s common to have many services processing a single request. Gone are the days when a monolithic application was …
●●●