Cybersecurity and other IT news aggregator

LATEST FEEDS

  • Uncle Sam puts $10M bounty on Russian troll farm Rybar

    Uncle Sam puts $10M bounty on Russian troll farm Rybar 2024-10-18 at 04:02 By Connor Jones Propaganda op focuses on anti-West narratives to meddle with elections The US has placed a $10 million bounty on Russian media network Rybar and a number of its key staffers following alleged attempts to sway the upcoming US presidential…


  • Destiny Robotics settles SEC case over AI-powered human robot vaporware

    Destiny Robotics settles SEC case over AI-powered human robot vaporware 2024-10-18 at 03:46 By Iain Thomson Raised $141k+ crowdfunding, but now powered down The SEC has reached a deal with defunct Destiny Robotics after investors lost all their capital when the startup failed to produce the promised product.… This article is an excerpt from The…


  • Troubled US insurance giant hit by extortion after data leak

    Troubled US insurance giant hit by extortion after data leak 2024-10-18 at 02:46 By Brandon Vigliarolo Globe Life claims blackmailers shared stolen into with short sellers US insurance provider Globe Life, already grappling with legal troubles, now faces a fresh headache: an extortion attempt involving stolen customer data.… This article is an excerpt from The…


  • FCC fines be damned, ESPN misuses emergency alert tones yet again

    FCC fines be damned, ESPN misuses emergency alert tones yet again 2024-10-18 at 01:37 By Brandon Vigliarolo It’s the third strike, yet all they get is a slap on the wrist? Sports broadcasting network ESPN faces a proposed fine for using emergency alert service (EAS) attention sounds without authorization – again, apparently.… This article is…


  • Qualcomm ‘pausing’ X-Elite Dev Kit, offering refunds

    Qualcomm ‘pausing’ X-Elite Dev Kit, offering refunds 2024-10-18 at 00:18 By Tobias Mann Five months in, only 200 units reached customers, Qualy tells El Reg Qualcomm has officially pulled the plug on its Snapdragon for Windows Dev Kits less than five months after the X-Elite powered mini-PCs were announced.… This article is an excerpt from…


  • Samsung releases 24Gb GDDR7 DRAM for testing in beefy AI systems

    Samsung releases 24Gb GDDR7 DRAM for testing in beefy AI systems 2024-10-17 at 23:34 By Gavin Bonshor Production slated for Q1 2025, barring any hiccups Samsung has finally stolen a march in the memory market with 24 Gb GDDR7 DRAM being released for validation in AI computing systems from GPU customers before production – expected…


  • How to Mitigate the Impact of Rogue AI Risks

    How to Mitigate the Impact of Rogue AI Risks 2024-10-17 at 23:34 By This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:


  • 5 AI Security Takeaways featuring Forrester

    5 AI Security Takeaways featuring Forrester 2024-10-17 at 23:34 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News…


  • Microsoft crafts Rust hypervisor to power Azure workloads

    Microsoft crafts Rust hypervisor to power Azure workloads 2024-10-17 at 22:31 By Thomas Claburn OpenVMM touts stronger security, but not ready for prime time just yet Microsoft earlier this month published code for a new hypervisor, or virtual machine monitor (VMM), written in Rust.… This article is an excerpt from The Register View Original Source…


  • Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

    Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack) 2024-10-17 at 22:04 By Karl Biron Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. Attackers are on the prowl for weaknesses in infrastructure and software like a cat eyeing its helpless prey. This article is an excerpt from…


  • Infrastructure giant Schneider Electric powers up with $850M liquid cooling deal

    Infrastructure giant Schneider Electric powers up with $850M liquid cooling deal 2024-10-17 at 21:48 By Dan Robinson Snags controlling stake in Motivair Corporation, rest to come by 2028 Schneider Electric is taking a controlling interest in Motivair Corporation, a specialist in liquid cooling and thermal management tech for high-performance computing (HPC) systems.… This article is…


  • Manifest file destiny: Declare your funding needs via JSON

    Manifest file destiny: Declare your funding needs via JSON 2024-10-17 at 20:02 By Thomas Claburn India-based stockbroker Zerodha pledges $1M a year for open source projects Zerodha, an India-based stock brokerage, has launched a fund to support open source software, to which the company attributes its existence and success.… This article is an excerpt from…


  • Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

    Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant 2024-10-17 at 19:31 By The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a…


  • Western Digital releases firmware fix for SSDs blighted by Windows 11 24H2 BSODs

    Western Digital releases firmware fix for SSDs blighted by Windows 11 24H2 BSODs 2024-10-17 at 18:46 By Richard Speed Microsoft tells us it is investigating the issue… Phew, that’s ok then Microsoft says it is looking into reports that certain Western Digital SSDs are causing trouble for users of Windows 11 24H2 on some devices.……


  • Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

    Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program 2024-10-17 at 17:16 By Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group’s affiliate panel on the dark web. Singapore-headquartered Group-IB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime…


  • Brazilian police claim they’ve cuffed serial cybercrook behind FBI and Airbus attacks

    Brazilian police claim they’ve cuffed serial cybercrook behind FBI and Airbus attacks 2024-10-17 at 17:01 By Connor Jones Early stage opsec failures lead to landmark arrest of suspected serial data thief Brazilian police are being cagey with the details about the arrest of a person suspected to be responsible for various high-profile data thefts.… This…


  • How to Implement Microsoft Security Products for Maximum Value

    How to Implement Microsoft Security Products for Maximum Value 2024-10-17 at 17:01 By Cybersecurity teams are in a tough spot these days. This article is an excerpt from Trustwave Blog View Original Source React to this headline:


  • SolarWinds Releases Patches for High-Severity Vulnerabilities

    SolarWinds Releases Patches for High-Severity Vulnerabilities 2024-10-17 at 16:46 By daksh sharma Overview SolarWinds has issued an important security update advisory outlining the latest vulnerability patches released for its products. This advisory provides insights into recently disclosed vulnerabilities affecting the SolarWinds range and emphasizes the need for organizations to take immediate action to protect their…


  • Lessons Learned from the Illinois Voter Data Breach and How to Protect Election Infrastructure

    Lessons Learned from the Illinois Voter Data Breach and How to Protect Election Infrastructure 2024-10-17 at 15:59 View original post at vpnMentor Recently I discovered and shared with vpnMentor about 15 unprotected and publicly exposed databases. They contained 4.6 million records, including sensitive Illinois voter information. Now that the dust has settled and as the…


  • HMD delivers Android Digital Detox feature to stop you scrolling your life away

    HMD delivers Android Digital Detox feature to stop you scrolling your life away 2024-10-17 at 15:46 By Liam Proven Update for Skyline phone brings selective distraction blocking A couple of months after launch, an OS update has delivered one of the Nokia HMD Skyline’s headline features.… This article is an excerpt from The Register View…


  • Research observes threat activity targeting 2024 Presidential Election

    Research observes threat activity targeting 2024 Presidential Election 2024-10-17 at 15:18 By New research shows the current threats associated with the 2024 Presidential Election.   This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • Over 90% of phishing campaigns lead victims to malware

    Over 90% of phishing campaigns lead victims to malware 2024-10-17 at 15:18 By Phishing remains the primary method used by attackers to gain initial access to networks, according to a recent report. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • TSMC revenue up 36% as world+dog demands AI and smartphone chips

    TSMC revenue up 36% as world+dog demands AI and smartphone chips 2024-10-17 at 15:01 By Dan Robinson Biggest semi contract manufacturer – and Nvidia supplier – building out capacity in US and Europe Taiwan’s semiconductor giant TSMC has reported a good third quarter with revenue up 36 percent over a year ago, due to strong demand…


  • Fake Google Meet pages deliver infostealers

    Fake Google Meet pages deliver infostealers 2024-10-17 at 14:47 By Zeljka Zorz Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect them with information-stealing malware. Fake Google Meet video conference page with malicious ClickFix pop-up (Source: Sekoia) “The ClickFix tactic deceives users into downloading…


  • GitHub Releases Security Advisory on Critical Vulnerability in Self-Hosted Environments

    GitHub Releases Security Advisory on Critical Vulnerability in Self-Hosted Environments 2024-10-17 at 14:31 By daksh sharma Overview GitHub has issued a security advisory regarding critical vulnerabilities that require immediate attention from users of the GitHub Enterprise Server (GHES). This advisory highlights a specific vulnerability that could severely compromise organizations’ security relying on this self-hosted version…


  • Post Office CTO had ‘nagging doubts’ about Horizon system despite reliability assurances

    Post Office CTO had ‘nagging doubts’ about Horizon system despite reliability assurances 2024-10-17 at 14:17 By Lindsay Clark As ‘heat’ built from campaigners, tech boss kept telling MPs everything was fine The former CTO of the Post Office had “nagging doubts” about the Horizon system at the center of one of the most far-reaching miscarriages…


  • Elon Musk’s disaster relief promises: Should we believe the hype?

    Elon Musk’s disaster relief promises: Should we believe the hype? 2024-10-17 at 13:41 By Steven J. Vaughan-Nichols When you look behind the headlines, you’ll find unfulfilled commitments Opinion  I live in Asheville, North Carolina. You may have seen my hometown in the news over the last few weeks after Hurricane Helene wrecked the place.… This…


  • 5 Ways to Reduce SaaS Security Risks

    5 Ways to Reduce SaaS Security Risks 2024-10-17 at 13:41 By As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack surface, much of which is often unknown or unmanaged. This greatly increases the risk…


  • SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

    SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack 2024-10-17 at 13:41 By An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked…


  • Ransomware: Threat Level Remains High in Third Quarter

    Ransomware: Threat Level Remains High in Third Quarter 2024-10-17 at 13:17 By Threat Hunter Team Recently established RansomHub group overtakes LockBit to become most prolific ransomware operation. This article is an excerpt from Broadcom Software Blogs View Original Source React to this headline:


  • Ransomware: Threat Level Remains High in Third Quarter

    Ransomware: Threat Level Remains High in Third Quarter 2024-10-17 at 13:17 By Threat Hunter Team Recently established RansomHub group overtakes LockBit to become most prolific ransomware operation. This article is an excerpt from Broadcom Software Blogs View Original Source React to this headline:


  • Ransomware: Threat Level Remains High in Third Quarter

    Ransomware: Threat Level Remains High in Third Quarter 2024-10-17 at 13:17 By Threat Hunter Team Recently established RansomHub group overtakes LockBit to become most prolific ransomware operation. This article is an excerpt from Broadcom Software Blogs View Original Source React to this headline:


  • UK electronics firms want government to stop taxing trash and let them fix it instead

    UK electronics firms want government to stop taxing trash and let them fix it instead 2024-10-17 at 12:31 By Dan Robinson CLEAR group calls for VAT to be dropped on spare parts, repairs, labor A newly formed group of UK electronics companies is advocating for the removal of VAT on electronic spare parts, repairs, and…


  • U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

    U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks 2024-10-17 at 12:19 By Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record 35,000 DDoS attacks in a single year, including those that targeted Microsoft’s services in June 2023. The attacks,…


  • WeChat devs introduced security flaws when they modded TLS, say researchers

    WeChat devs introduced security flaws when they modded TLS, say researchers 2024-10-17 at 11:46 By Connor Jones No attacks possible, but enough issues to cause concern Messaging giant WeChat uses a network protocol that the app’s developers modified – and by doing so introduced security weaknesses, researchers claim.… This article is an excerpt from The Register…


  • The role of compromised cyber-physical devices in modern cyberattacks

    The role of compromised cyber-physical devices in modern cyberattacks 2024-10-17 at 11:46 By Zeljka Zorz Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attackers’ infrastructure leads to a better understanding of the…


  • Cognizant Neuro Cybersecurity enhances threat detection and response

    Cognizant Neuro Cybersecurity enhances threat detection and response 2024-10-17 at 11:02 By Industry News Cognizant announced the debut of Cognizant Neuro Cybersecurity, a new addition to Cognizant’s Neuro suite of platforms, designed to amplify cybersecurity resilience by integrating and orchestrating point cybersecurity solutions across the enterprise. Sophisticated threat actors, hybrid workforces, and the complexity of…


  • Report: 200+ Malicious Apps on Google Play Downloaded Millions of Times

    Report: 200+ Malicious Apps on Google Play Downloaded Millions of Times 2024-10-17 at 10:59 View original post at Safety Detectives More than 200 malicious apps have been detected in the Google Play Store over the past year, and all of the apps collectively have been downloaded close to eight million times, according to a recently…


  • Anonymous Sudan isn’t any more: two alleged operators named, charged

    Anonymous Sudan isn’t any more: two alleged operators named, charged 2024-10-17 at 10:31 By Simon Sharwood Gang said to have developed its evilware on GitHub – then DDoSed GitHub Hacktivist gang Anonymous Sudan appears to have lost its anonymity after the US Attorney’s Office on Wednesday unsealed an indictment identifying two of its alleged operators.……


  • MongoDB Queryable Encryption now supports range queries on encrypted data

    MongoDB Queryable Encryption now supports range queries on encrypted data 2024-10-17 at 10:01 By Mirko Zorz MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the MongoDB database. It also enables direct equality and range queries on the encrypted data without the need for cryptographic…


  • Elon Musk’s X isn’t important enough to feel the full force of EU regulation

    Elon Musk’s X isn’t important enough to feel the full force of EU regulation 2024-10-17 at 09:46 By Iain Thomson DMA gatekeeper status denied, meaning X can carry on without extra compliance chores The EU has said it won’t classify Elon Musk’s X as “gatekeeper” – the bloc’s designation for the most significant digital platforms-…


  • Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

    Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk 2024-10-17 at 09:46 By A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as CVE-2024-9486 (CVSS score: 9.8), has been addressed in version 0.1.38.…


  • Where to Watch Haikyuu in Order & in English Sub/Dub (2024)

    Where to Watch Haikyuu in Order & in English Sub/Dub (2024) 2024-10-17 at 09:21 View original post at vpnMentor If you’re into sports anime, Haikyu!! is an absolute gem you shouldn’t miss. However, it can be a bummer to find that some seasons are locked behind regional restrictions or available only on certain streaming platforms.…


  • Oh, what a feeling: Toyota building robots that get better with practice

    Oh, what a feeling: Toyota building robots that get better with practice 2024-10-17 at 08:25 By Laura Dobberstein Bots that learn to peel potatoes is a lot less scary than Black Mirror Boston Dynamics and Toyota Research Institute (TRI) announced on Wednesday they’re partnering to combine the former’s multi-jointed athletic humanoid, Atlas, with TRI’s large…


  • GhostStrike: Open-source tool for ethical hacking

    GhostStrike: Open-source tool for ethical hacking 2024-10-17 at 07:31 By Mirko Zorz GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including process hollowing, to stealthily evade detection on Windows systems, making it an asset for penetration testing and security assessments. “I decided to develop…


  • It’s time to embrace OSCAL automation for effective risk management

    It’s time to embrace OSCAL automation for effective risk management 2024-10-17 at 07:17 By There are a multitude of regulatory standards and frameworks that organizations must adhere to, and keeping up with them can be difficult.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • China launches plan to lead the world in space exploration

    China launches plan to lead the world in space exploration 2024-10-17 at 07:02 By Simon Sharwood Long-term research program includes building Moon bases, finding habitable exoplanets, and probing ‘space-time ripples’ China yesterday revealed its space exploration plans between now and the year 2050, and one of the nation’s goals is finding habitable planets beyond our…


  • How NIS2 will impact sectors from healthcare to energy

    How NIS2 will impact sectors from healthcare to energy 2024-10-17 at 07:02 By Mirko Zorz In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the NIS2 Directive beyond traditional IT security. He explains how NIS2 will fundamentally change cybersecurity governance, making it a core aspect…


  • AI data collection under fire

    AI data collection under fire 2024-10-17 at 06:32 By Help Net Security A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching providers for any loss of trust. In this Help…


  • Why companies are struggling to keep up with SaaS data protection

    Why companies are struggling to keep up with SaaS data protection 2024-10-17 at 06:01 By Help Net Security While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents…


Browse older archives

Optimized by Optimole
Scroll to Top