NA - CVE-2024-6890 - Password reset tokens are generated using an...
Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the...
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
Protections like Windows Smart App Control are useful but susceptible to attacks that allow threat actors initial access to an environment without triggering any alerts.
Russia's Priorities in Prisoner Swap Suggest Cyber Focus
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap.