#information-security

[ follow ]
#cybersecurity
Information security
fromArs Technica
1 month ago

Cybersecurity takes a big hit in new Trump executive order

The Trump EO alters cybersecurity requirements by removing self-attestation for federal contractors, allowing potential security vulnerabilities to persist.
Cryptocurrency
fromThe Hacker News
1 month ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
Cryptocurrency
fromThe Hacker News
1 month ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
fromwww.npr.org
2 weeks ago

Impostor uses AI to impersonate Rubio and contact foreign and US officials

U.S. diplomats are warned of AI-driven impersonation attempts of Secretary of State Marco Rubio and other officials.
fromFast Company
3 weeks ago

These geeks are building an early warning system for disappearing government data

Meeta Anand, senior director of census and data equity, reported a flood of inquiries about vanishing datasets, indicating widespread concern over lost governmental data.
US politics
Online Community Development
fromIT Pro
1 month ago

MCP servers used by developers and 'vibe coders' are riddled with vulnerabilities - here's what you need to know

MCP servers are highly vulnerable due to their misconfiguration, risking sensitive assets and enabling unauthorized remote access.
The prevalence of vulnerabilities such as 'NeighborJack' highlights the need for better security measures in MCP server deployments.
fromThe Hacker News
1 month ago

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Former CIA analyst Asif Rahman sentenced to 37 months for unlawfully retaining and transmitting top secret information.
Software was used to edit images of classified documents to conceal transmission activity.
#data-breach
fromDatabreaches
2 months ago
EU data protection

Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki

fromDatabreaches
2 months ago
EU data protection

Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki

#military-operations
US news
fromwww.nytimes.com
3 months ago

Adam Schiff asks the National Archives to review the Trump administration's use of Signal.

Pete Hegseth shared sensitive military information in a private chat, raising concerns about security protocols.
US news
fromwww.nytimes.com
3 months ago

Adam Schiff asks the National Archives to review the Trump administration's use of Signal.

Pete Hegseth shared sensitive military information in a private chat, raising concerns about security protocols.
#national-security
fromTechCrunch
3 months ago
Privacy professionals

Trump's national security advisor reportedly used his personal Gmail account to do government work | TechCrunch

US news
fromwww.mediaite.com
3 months ago

BREAKING: Pete Hegseth Reportedly Shared Attack Details With Wife and Brother in Second Signal Chat

Defense Secretary's unauthorized disclosure of military strikes raises security concerns.
Hegseth utilized Signal app for private chats potentially compromising classified information.
Privacy professionals
fromTechCrunch
3 months ago

Trump's national security advisor reportedly used his personal Gmail account to do government work | TechCrunch

Senior Trump administration officials improperly used personal Gmail for government communications, risking sensitive information.
US politics
fromABC7 Los Angeles
4 months ago

Trump downplays national security team texting military operation plan on Signal as a minor 'glitch'

Trump downplayed messaging error in military chats, calling it a minor glitch amid criticism from Democrats on information security.
fromDatabreaches
2 months ago

N.W.T.'s medical record system under the microscope after 2 reported cases of snooping

Medical records are vulnerable to unauthorized access, highlighting a need for better privacy protections.
fromComputerWeekly.com
2 months ago

Beyond the hook: How phishing is evolving in the world of AI | Computer Weekly

Phishing attacks have evolved dramatically, shifting from generic emails to hyper-personalised schemes leveraging AI—complicating countermeasures and increasing risks.
Artificial intelligence
#trump-administration
US politics
fromwww.theguardian.com
4 months ago

Trump has managed to spin Signalgate as a media lapse, not a major security breach | Andrew Roth

The Signal chat controversy reveals significant issues in government communication and security during the Trump era.
US politics
fromwww.theguardian.com
4 months ago

Trump has managed to spin Signalgate as a media lapse, not a major security breach | Andrew Roth

The Signal chat controversy reveals significant issues in government communication and security during the Trump era.
US news
fromeuronews
3 months ago

Hegseth shared airstrike details in second Signal chat, media report

US Defence Secretary Pete Hegseth shared a military airstrike's details in a non-secure chat, raising concerns over classified information handling.
fromwww.dw.com
3 months ago

Hegseth shared Yemen war plans in second Signal chat: media DW 04/21/2025

US Defense Secretary Pete Hegseth shared sensitive info about an attack on Yemen's Houthis in unauthorized Signal chats, prompting security investigations.
US news
fromABC7 Los Angeles
3 months ago

2nd Signal chat reveals Hegseth messaging about Yemen strikes with family members, sources say

Defense Secretary Pete Hegseth allegedly shared sensitive military attack details in a private Signal group chat, raising security concerns.
fromHackernoon
1 year ago

Prompt Injection Is What Happens When AI Trusts Too Easily | HackerNoon

Generative AI is becoming essential in daily life, but it poses significant security threats like prompt injection, which can manipulate AI systems.
fromTheregister
3 months ago

Oracle plays coy on reported Cloud, Health security breaches

Oracle is facing severe data security allegations, with potential evidence of a breach that the company denies.
fromPoynter
4 months ago

You're a journalist added to a classified group chat. Here's what you need to consider. - Poynter

When journalists receive sensitive information, they should always consider the ethical implications, especially in light of past breaches and the current political climate.
Privacy professionals
US news
fromDatabreaches
4 months ago

The Trump Administration Accidentally Texted Me Its War Plans

The leak of sensitive military plans to a reporter raises critical questions about security and information sharing during conflicts.
fromInc
4 months ago

Why You Need to Follow Consumer Trends

Consumer expectations are rising, emphasizing the need for businesses to prioritize trust, transparency, and customer communication.
Privacy technologies
fromMail Online
5 months ago

Alarming report finds Apple is giving Americans' data to US government

Big Tech companies are increasingly sharing personal data with the US government, raising privacy concerns.
Significant increases in data-sharing rates have been reported among major companies like Apple, Google, and Meta.
fromeLearning Industry
5 months ago

How Can Encryption Protect Your Data? A Guide For eLearning Students

In a world where cyber threats are more prevalent than ever, understanding how encryption works is crucial for eLearning students to protect their personal data.
Privacy professionals
fromAbove the Law
5 months ago

But Her Emails Redux: Team Trump Makes CIA Send List Of All Recently Hired Employees Over Unclassified Email - Above the Law

The White House demanded that sensitive CIA hiring information be sent via unclassified email, risking exposure to adversaries, despite prior warnings about email security.
Law
fromTheregister
5 months ago

Reused AWS S3 buckets a weak link in supply chain security

Abandoned AWS S3 buckets pose serious security risks and can be hijacked for software supply chain attacks.
[ Load more ]