#cybersecurity

[ follow ]
#ransomware
fromIT Pro
1 day ago
Privacy technologies

Swiss government data published following supply chain attack - here's what we know about the culprits

fromWIRED
14 hours ago
Privacy technologies

A Group of Young Cybercriminals Poses the 'Most Imminent Threat' of Cyberattacks Right Now

fromIT Pro
1 day ago
Privacy technologies

Swiss government data published following supply chain attack - here's what we know about the culprits

fromWIRED
14 hours ago
Privacy technologies

A Group of Young Cybercriminals Poses the 'Most Imminent Threat' of Cyberattacks Right Now

fromTheregister
1 hour ago

ChatGPT creates phisher's paradise by serving wrong URLs

The AI produced the correct web address just 66 percent of the time, while 29 percent of URLs pointed to dead or suspended sites, and five percent to legitimate but incorrect sites.
Privacy technologies
#data-breach
Privacy technologies
fromTechCrunch
18 hours ago

Exclusive: Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones

A security vulnerability in Catwatchful spyware exposed the personal data of over 62,000 customers and 26,000 victims.
fromTechCrunch
18 hours ago
Privacy technologies

Exclusive: Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones

#threat-detection
fromForbes
3 hours ago
Privacy professionals

Google Play Store Warning-Find And Delete All Apps On This List

fromForbes
3 hours ago
Privacy professionals

Google Play Store Warning-Find And Delete All Apps On This List

#vulnerability
fromZDNET
2 days ago
Privacy professionals

Does your Brother printer have an unpatchable security flaw? How to check - and what you can do

fromZDNET
2 days ago
Privacy professionals

Does your Brother printer have an unpatchable security flaw? How to check - and what you can do

#risk-management
#north-korea
fromFortune
21 hours ago
Privacy professionals

North Korean operative reveals the inner workings of the IT scam infiltrating the Fortune 500 - 'They had no idea that we were from North Korea'

fromTechCrunch
2 days ago
US politics

US government takes down major North Korean 'remote IT workers' operation | TechCrunch

fromWIRED
2 days ago
US politics

Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

fromFortune
21 hours ago
Privacy professionals

North Korean operative reveals the inner workings of the IT scam infiltrating the Fortune 500 - 'They had no idea that we were from North Korea'

fromTechCrunch
2 days ago
US politics

US government takes down major North Korean 'remote IT workers' operation | TechCrunch

fromWIRED
2 days ago
US politics

Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

#phishing
fromZDNET
13 hours ago
Privacy technologies

Phishers built fake Okta and Microsoft 365 login sites with AI - here's how to protect yourself

fromThe Hacker News
1 day ago
Privacy technologies

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

fromZDNET
1 day ago
Privacy professionals

Got a suspicious UPS text? Don't reply - it might be a scam. Here's how to tell

fromZDNET
13 hours ago
Privacy technologies

Phishers built fake Okta and Microsoft 365 login sites with AI - here's how to protect yourself

fromThe Hacker News
1 day ago
Privacy technologies

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

fromZDNET
1 day ago
Privacy professionals

Got a suspicious UPS text? Don't reply - it might be a scam. Here's how to tell

#critical-infrastructure
fromBreaking Defense
2 days ago

Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security

Homeland Security's Cybersecurity & Infrastructure Security Agency warned US defense contractors working in Israel that they may be targeted by Iranian cyber attacks.
US politics
from24/7 Wall St.
16 hours ago

Is UnitedHealth Group (UNH) a Buy Now After These 2 Huge Developments?

In December, UnitedHealthcare CEO Brian Thompson was assassinated, sparking public backlash over the company's claims denial process. UNH suffered a rare first-quarter earnings miss.
Healthcare
#uk-businesses
#privacy
fromChannelPro
20 hours ago

Trustwave acquisition positions LevelBlue as 'largest pure-play MSSP'

The acquisition will combine LevelBlue's expertise in strategic risk management and cybersecurity infrastructure with Trustwave's Fusion Platform and cloud native MDR service.
Privacy professionals
fromTheregister
22 hours ago

Cl0p data exfiltration tool found vulnerable to RCE attacks

The vulnerability in the Python-based software, which was used in the 2023-2024 MOVEit mass data raids, was discovered by Italian researcher Lorenzo N. This flaw, categorized as an improper input validation bug, has a severity score of 8.9 and arises from a lack of input sanitization, leading the tool to construct OS commands by concatenating attacker-supplied strings.
Information security
fromTheregister
23 hours ago

UK eyes new laws over cable sabotage

Cyberattacks and undersea cable sabotage are increasingly blurring the line between war and peace, necessitating a reevaluation of existing legislation in the UK.
UK news
fromIT Pro
1 day ago

M&S aims for full online restoration within four weeks following major cyber attack

M&S expects its online operations to be fully restored within the next four weeks, continuing its recovery from a major cyber attack in April.
Privacy professionals
fromSecuritymagazine
1 day ago

The Rise of Vendor Fraud in a World of AI and Trade Chaos

Fraudsters are already weaponizing generative AI to impersonate vendors, reroute payments and slip through onboarding workflows. Now, as the chaos intensifies, they're finding it even easier to blend in.
Privacy technologies
#political-smear-campaign
fromFuturism
1 day ago
US politics

Iranian Hackers Threaten to Release Stolen Emails From Trump's Inner Circle

fromFuturism
1 day ago
US politics

Iranian Hackers Threaten to Release Stolen Emails From Trump's Inner Circle

fromHackernoon
1 year ago

Decentralized Public-Key Infrastructure: The Future of Supply Chain Security | HackerNoon

In March 2023, cybercriminals infiltrated 3CX's build environment, injecting malicious code into a library file for its macOS and Windows desktop apps.
Privacy professionals
#iran
fromThe Hacker News
2 days ago
Privacy technologies

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure

fromThe Hacker News
2 days ago
Privacy technologies

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure

#remote-code-execution
#passkeys
fromZDNET
1 day ago
Privacy technologies

Microsoft Authenticator won't manage your passwords anymore - here's why and what's next

fromZDNET
2 days ago
Privacy technologies

Microsoft Authenticator will soon ditch passwords for passkeys - here's what to do

fromZDNET
1 day ago
Privacy technologies

Microsoft Authenticator won't manage your passwords anymore - here's why and what's next

fromZDNET
2 days ago
Privacy technologies

Microsoft Authenticator will soon ditch passwords for passkeys - here's what to do

fromHackernoon
10 months ago

Solving the IoT's "Boy Who Cried Wolf" Problem: From Individual Alerts to Cumulative Certainty | HackerNoon

Anomaly detection has been studied across application domains with techniques rooted in statistical inference and machine learning, focusing on three categories: point, contextual, and collective anomalies.
Artificial intelligence
fromEntrepreneur
1 day ago

5 Data Backup Mistakes that Could Bankrupt Your Startup | Entrepreneur

Many startups rely on cloud storage for data sync rather than as a proper backup solution. This mistake could lead to complete data loss during a cyberattack.
Business
fromThe Hacker News
1 day ago

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

Both TA829 and UNK_GreenSec rely on REM Proxy services deployed on compromised MikroTik routers, though the specific breach method of these devices remains unclear.
Privacy professionals
#international-criminal-court
fromBusiness Insider
1 day ago

Businesses are scrambling to keep themselves safe against AI's evolving threats

The deepfake economy is rapidly evolving, with scams quadrupling in the last year due to GenAI tools. Professionals across industries are scrambling to counter AI's threats.
Privacy technologies
fromTechzine Global
1 day ago

ManageEngine launches MSP Central for centralized management

MSP Central offers a modular architecture that allows MSPs to start with needed components and expand as their services grow, avoiding mandatory bundles or licenses.
Tech industry
fromThe Hacker News
1 day ago

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

Enterprises are neglecting browser security, the critical layer where most modern work is conducted.
Privacy technologies
fromHackernoon
2 years ago

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are | HackerNoon

"Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case."
Privacy professionals
fromNextgov.com
2 days ago

Senate panel advances Trump's national cyber director nominee

Just be honest about it. You can't say you care about an increasing and more sophisticated set of attacks while cutting the very people who help defend against those attacks.
US politics
#ai
fromDevOps.com
2 days ago
Software development

Kusari Adds AI Security Tool to Inspect Code as Pull Requests Are Made - DevOps.com

Kusari Inspector enhances security for developers during pull requests while maintaining productivity.
fromFast Company
2 days ago
Artificial intelligence

Cato Networks secures $359 million in latest funding round

Cato Networks raised $359 million, highlighting strong investor interest in AI-driven cybersecurity amid rising cyber threat levels.
fromDevOps.com
2 days ago
Software development

Kusari Adds AI Security Tool to Inspect Code as Pull Requests Are Made - DevOps.com

fromPatently-O
2 days ago

Hedging on Claim Construction: USPTO Says Keep It to One IPR Petition

The Acting USPTO Director vacated the PTAB's institution of two IPR proceedings against the same patent claims, determining it was an abuse of discretion.
Intellectual property law
fromTechCrunch
2 days ago

Mexican drug cartel hacker spied on FBI official's phone to track and kill informants, report says | TechCrunch

In 2018, hackers tied to the Sinaloa cartel infiltrated U.S. Embassy surveillance to target individuals linked to investigations against cartel members, including 'El Chapo'.
US politics
fromTelecompetitor
2 days ago

TDS Telecom and F-Secure Launch Scam Protection Service

Scams today are engineered to deceive even the most tech-savvy users. By integrating our advanced scam protection into the TDS Internet Security Suite, we're enabling a more proactive, intelligent defense against evolving digital threats.
Privacy technologies
#vulnerabilities
fromDeveloper Tech News
2 days ago
Software development

NSA and CISA urge shift to languages improving memory safety

Emphasizing the need for developers to choose programming languages that prioritize memory safety could greatly reduce security vulnerabilities.
fromThe Verge
2 days ago
Privacy technologies

Hundreds of Brother printer models have an unpatchable security flaw

Change default passwords on devices to enhance security against vulnerabilities.
#data-privacy
#social-engineering
fromIT Pro
2 days ago
Privacy professionals

The Scattered Spider hacker group has a new industry in its crosshairs

fromIT Pro
2 days ago
Privacy professionals

The Scattered Spider hacker group has a new industry in its crosshairs

fromTechzine Global
2 days ago

Cato Networks valued at nearly $5 billion after investment round

Cato Networks, known for its cloud-based security solutions, continues to attract significant investment, reflecting strong interest in integrated SASE approaches among modern organizations.
Venture
#data-security
fromDevOps.com
2 days ago

Still Running Vulnerable Log4j Instances? - DevOps.com

Many organizations remain exposed to Log4j vulnerabilities due to patching delays, unknown dependencies, and a lack of visibility into active environments.
Privacy professionals
fromTechzine Global
2 days ago

Memory-safe malware: Rust challenges security researchers

The rising use of Rust in malware poses significant challenges for security researchers; its unique structure complicates the identification of malicious actions within code.
Privacy professionals
fromSecuritymagazine
3 days ago

Breaking Down Burnout: Healing Cyber Teams with the Right Tools and Strategies

Cybersecurity teams are burning out at alarming rates, with 63% of professionals affected, primarily due to overwhelming workloads and structural issues within teams.
Information security
fromABC7 Los Angeles
3 days ago

Sinaloa drug cartel used hacker to track FBI official, then killed potential informants, audit says

The cartel used information provided by the hacker to intimidate and, in some instances, kill potential sources or cooperating witnesses.
US politics
#scattered-spider
fromDatabreaches
5 days ago
Privacy professionals

Alert: Scattered Spider has added North American airline and transportation organizations to their target list

fromDatabreaches
5 days ago
Privacy professionals

Alert: Scattered Spider has added North American airline and transportation organizations to their target list

[ Load more ]