Cybersecurity and other IT news aggregator
LATEST FEEDS
-
Homing pigeon missiles, dead trout swimming, butt breathing honored with Ig Nobel Prize
Homing pigeon missiles, dead trout swimming, butt breathing honored with Ig Nobel Prize 2024-09-14 at 13:47 By Richard Currie Mad science award ceremony returns to MIT after four years online With less than a month to go before the Nobel Prizes are handed out for the most worthy scientific discoveries of the preceding year, it…
-
Begun, the open source AI wars have
Begun, the open source AI wars have 2024-09-14 at 12:46 By Steven J. Vaughan-Nichols This is going to be ugly. Really ugly Opinion The Open Source Initiative (OSI) and its allies are getting closer to a definition of open source AI. If all goes well, Stefano Maffulli, the OSI’s executive director, expects to announce the…
-
Meta back at it, harvesting Britons’ public Facebook, Insta feeds for AI training
Meta back at it, harvesting Britons’ public Facebook, Insta feeds for AI training 2024-09-14 at 10:31 By Iain Thomson I wanna know 🎵 What you’re feeling 🎵 Tell me what’s on your mind Meta is going to resume scraping the personal public feeds of British Facebook and Instagram users for training AI after reaching an…
-
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability 2024-09-14 at 07:47 By Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain…
-
Apple AirPods Pro 2 can be sold as hearing aids, says FDA
Apple AirPods Pro 2 can be sold as hearing aids, says FDA 2024-09-14 at 02:17 By Iain Thomson You gotta admit, that speaks volumes for Cupertino America’s drug watchdog this week gave Apple permission to market its new AirPods as over-the-counter hearing aids, disrupting an industry where traditional devices have often cost thousands of dollars.……
-
Apple Suddenly Drops NSO Group Spyware Lawsuit
Apple Suddenly Drops NSO Group Spyware Lawsuit 2024-09-14 at 00:01 By Ryan Naraine Apple said there’s “too significant a risk” of exposing the anti-exploit work needed to fend off the very adversaries involved in the case. The post Apple Suddenly Drops NSO Group Spyware Lawsuit appeared first on SecurityWeek. This article is an excerpt from…
-
EU OKs $1.9B aid for Intel Polish plant, assuming x86 giant doesn’t end up cutting it
EU OKs $1.9B aid for Intel Polish plant, assuming x86 giant doesn’t end up cutting it 2024-09-13 at 22:46 By Tobias Mann That’s zloty money but is it too little, too late? Intel is scrambling to stanch the bleeding of its floundering foundry business, but in Poland at least the chipmaker’s luck is looking up.……
-
AI giants pinky swear (again) not to help make deepfake smut
AI giants pinky swear (again) not to help make deepfake smut 2024-09-13 at 22:01 By Brandon Vigliarolo Oh look, another voluntary, non-binding agreement to do better Some of the largest AI firms in America have given the White House a solemn pledge to prevent their AI products from being used to generate non-consensual deepfake pornography…
-
Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel
Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel 2024-09-13 at 21:45 By Ryan Naraine Microsoft is revamping how anti-malware tools interact with the Windows kernel to avoid another CrowdStrike faulty update catastrophe. The post Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel appeared first on SecurityWeek. This article is an excerpt…
-
Feeld dating app’s security too open-minded as private data swings into public view
Feeld dating app’s security too open-minded as private data swings into public view 2024-09-13 at 21:31 By Connor Jones No love for months-long wait to fix this, either Security researchers have revealed a litany of failures in the Feeld dating app that could be abused to access all manner of private user data, including the…
-
The Europa Clipper stretches its wings as launch nears
The Europa Clipper stretches its wings as launch nears 2024-09-13 at 19:31 By Richard Speed Solar arrays are massive… but it’s the transistors onlookers are really worried about NASA’s Europa Clipper is now less than a month from its October 10 launch, and the US space agency has shown off the spacecraft’s giant solar arrays.…
-
64% of education IT workers say ransomware impacts education quality
64% of education IT workers say ransomware impacts education quality 2024-09-13 at 19:16 By A new survey reveals IT leaders’ concerns about cybersecurity in education. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers 2024-09-13 at 18:31 By Details have emerged about a now-patched security flaw impacting Apple’s Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device’s virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE…
-
Win 11 refreshes delayed say PC makers – and here’s why
Win 11 refreshes delayed say PC makers – and here’s why 2024-09-13 at 18:16 By Paul Kunert Oh and about those AI computers… analysts reckon there are still no killer apps or convincing use cases Admins had better dust off their Windows migration skills if Dell and HP are right that a refresh wave of…
-
Intel Warns of 20+ Vulnerabilities: Urges Firmware Updates
Intel Warns of 20+ Vulnerabilities: Urges Firmware Updates 2024-09-13 at 18:02 View original post at vpnMentor Intel has issued a security advisory detailing over 20 vulnerabilities affecting various processors, and has urged users to update their systems. The vulnerabilities primarily impact Intel’s UEFI firmware, used in processors such as Atom, Xeon, Pentium, Celeron, and Core.…
-
MongoDB CEO says if AI hype were the dotcom boom it is 1996
MongoDB CEO says if AI hype were the dotcom boom it is 1996 2024-09-13 at 17:47 By Lindsay Clark NoSQL database slinger attempts to reassure investors, kinda Analysis It is 1996 in terms of the business adoption of AI if it were put on the dotcom era timeline, according to MongoDB CEO Dev Ittycheria.… This…
-
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London 2024-09-13 at 17:01 By British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). “The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which…
-
Microsoft is updating Windows to avoid repeat of CrowdStrike catastrophe
Microsoft is updating Windows to avoid repeat of CrowdStrike catastrophe 2024-09-13 at 16:46 By Connor Jones Existing low-level kernel access for security solutions will undergo a rework Microsoft says it’s working on Windows to allow endpoint security solutions to operate outside of the operating system’s kernel, all with a view to preventing any future CrowdStrike-esque…
-
In Other News: Possible Adobe Reader Zero-Day, Hijacking Mobi TLD, WhatsApp View Once Exploit
In Other News: Possible Adobe Reader Zero-Day, Hijacking Mobi TLD, WhatsApp View Once Exploit 2024-09-13 at 16:31 By SecurityWeek News Noteworthy stories that might have slipped under the radar: a possible Adobe Reader zero-day, researchers mistakenly hijack .mobi TLD, and an exploited WhatsApp View Once bypass. The post In Other News: Possible Adobe Reader Zero-Day, Hijacking…
-
Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks
Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks 2024-09-13 at 16:31 By Eduard Kovacs Apple has released a patch for Vision Pro after researchers showed how an attacker can obtain passwords typed by looking at keys. The post Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks appeared first on SecurityWeek. This article is…
-
Identity, Endpoints, and the Cloud Drive the Microsoft Security Product E5 Decision
Identity, Endpoints, and the Cloud Drive the Microsoft Security Product E5 Decision 2024-09-13 at 16:02 By For companies with the Microsoft 365 E3 license, the decision on whether to upgrade to 365 E5 is likely taken into consideration, and security should certainly be included. With E5, companies will likely find security upgrades in three key…
-
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media 2024-09-13 at 16:01 By Jose Tozo With the US election on the horizon, it’s a good time to explore the concept of social media weaponization and its use in asymmetrically manipulating public opinion through bots, automation, AI, and shady…
-
Boeing union workers in US reject contract: 96% vote to strike
Boeing union workers in US reject contract: 96% vote to strike 2024-09-13 at 15:47 By Richard Speed Doubtful processes, risky spacecraft, what else could possibly go wrong? Oh…30,000 staff off work Industrial difficulties can be added to the list of woes at aerospace giant Boeing after members of the International Association of Machinists and Aerospace…
-
How to ensure security without compromising privacy
How to ensure security without compromising privacy 2024-09-13 at 15:46 By Security leaders can find the proper balance between securing an organization with video surveillance and protecting individual privacy. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Revolutionizing Web Hosting: Webdock’s Commitment to Performance, Simplicity, and Sustainability
Revolutionizing Web Hosting: Webdock’s Commitment to Performance, Simplicity, and Sustainability 2024-09-13 at 15:40 View original post at Website Planet Webdock was born out of a desire to simplify web hosting while delivering high-performance solutions, as shared in their interview with Website Planet. By merging powerful infrastructure with an intuitive Web Server Control Panel, Webdock offers…
-
UK Data Centers Adopt Critical Infrastructure Label
UK Data Centers Adopt Critical Infrastructure Label 2024-09-13 at 15:31 View original post at Safety Detectives The UK is now labeling data centers as critical infrastructure to improve their cybersecurity defenses. Critical infrastructure has more stringent cybersecurity standards than a normal company would have, guaranteeing its protection against a broad range of threats. There are…
-
Empowering Businesses with Proactive IT Solutions: An Interview with Paul Okiria Oken from Othware
Empowering Businesses with Proactive IT Solutions: An Interview with Paul Okiria Oken from Othware 2024-09-13 at 15:30 View original post at Website Planet Othware, founded in 2016, emerged from the need for proactive, future-focused IT solutions. In an interview with Website Planet, Oken shared that he was frustrated by the reactive nature of many IT…
-
Hackers Are Using The US Presidential Election To Scam Voters
Hackers Are Using The US Presidential Election To Scam Voters 2024-09-13 at 15:27 View original post at Safety Detectives Scammers are taking advantage of the tense political election in the US to scam voters. These scams involve sending phishing emails riddled with patriotic language, calls to action, and fake election information. These letters are written…
-
Cyberattack compromises and shuts down Highline Public Schools
Cyberattack compromises and shuts down Highline Public Schools 2024-09-13 at 15:16 By Security leaders weigh in on the Highline Public Schools cyberattack. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft 2024-09-13 at 15:16 By Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible. However, most tools available on the…
-
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud 2024-09-13 at 15:16 By Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in…
-
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw 2024-09-13 at 15:16 By Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours…
-
New ‘Hadooken’ Linux Malware Targets WebLogic Servers
New ‘Hadooken’ Linux Malware Targets WebLogic Servers 2024-09-13 at 15:01 By Ionut Arghire The recently observed Hadooken malware targeting Oracle WebLogic applications is linked to multiple ransomware families. The post New ‘Hadooken’ Linux Malware Targets WebLogic Servers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to…
-
House Report Shows Chinese Cranes a Security Risk to US Ports
House Report Shows Chinese Cranes a Security Risk to US Ports 2024-09-13 at 15:01 By Ionut Arghire A joint report from the Committees on China and Homeland Security warns of the security risks posed by Chinese cranes in US ports. The post House Report Shows Chinese Cranes a Security Risk to US Ports appeared first…
-
UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy
UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy 2024-09-13 at 15:01 By Kevin Townsend The designation of UK data centers as Critical National Infrastructure strengthens cyber defenses, but a proposed £3.75B data center on protected Green Belt land sparks debate. The post UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt…
-
UK Teen Arrested Over Transport for London Hack
UK Teen Arrested Over Transport for London Hack 2024-09-13 at 15:01 By Eduard Kovacs A 17-year-old from England has been arrested by the NCA over the recent cyberattack on Transport for London. The post UK Teen Arrested Over Transport for London Hack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed…
-
As Oracle’s AWS deal completes Big 3 triumvirate, questions remain over licensing
As Oracle’s AWS deal completes Big 3 triumvirate, questions remain over licensing 2024-09-13 at 14:31 By Lindsay Clark Some users will see the appeal of Big Red stacking its hardware in Amazon’s datacenters Analysis At Big Red’s recent CloudWorld shindig in Las Vegas, Matt Garman, CEO of AWS, looked comfortable and relaxed being hosted by…
-
UK watchdog fears Voda-Three merger would bump phone bills for customers
UK watchdog fears Voda-Three merger would bump phone bills for customers 2024-09-13 at 14:01 By Dan Robinson Analysts claim it would be better for competition though Britain’s competition watchdog is worried the proposed merger between Vodafone and Three UK could lead to bigger bills for customers, a view rejected by the companies who see it…
-
1.3 Million Android TV Boxes Infected by Vo1d Malware
1.3 Million Android TV Boxes Infected by Vo1d Malware 2024-09-13 at 13:17 By Ionut Arghire Doctor Web warns of the new Vo1d Android malware infecting roughly 1.3 million TV boxes running older OS versions. The post 1.3 Million Android TV Boxes Infected by Vo1d Malware appeared first on SecurityWeek. This article is an excerpt from…
-
‘Hyperscale customer’ to take massive datacenter site near London
‘Hyperscale customer’ to take massive datacenter site near London 2024-09-13 at 12:46 By Dan Robinson ‘Commercially sensitive’ incognito buyer has a lot more support than last group that tried to build a bit barn near M25 Exclusive One of Europe’s largest datacenter campuses is scheduled to be built in the UK close to the M25…
-
GitLab Updates Resolve Critical Pipeline Execution Vulnerability
GitLab Updates Resolve Critical Pipeline Execution Vulnerability 2024-09-13 at 12:16 By Ionut Arghire GitLab has released security updates to resolve multiple vulnerabilities in GitLab CE/EE, including a critical-severity pipeline execution flaw. The post GitLab Updates Resolve Critical Pipeline Execution Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original…
-
Fortinet Data Breach Impacts Customer Information
Fortinet Data Breach Impacts Customer Information 2024-09-13 at 12:16 By Eduard Kovacs Fortinet has confirmed suffering a data breach impacting customers after a hacker leaked files allegedly stolen from the company. The post Fortinet Data Breach Impacts Customer Information appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source…
-
Stealthy Fileless Attack Targets Attendees of Upcoming US-Taiwan Defense Industry Event
Stealthy Fileless Attack Targets Attendees of Upcoming US-Taiwan Defense Industry Event 2024-09-13 at 12:01 By rohansinhacyblecom Key Takeaways Overview The initial infection vector of this campaign remains unclear; however, based on the lure document analyzed, there are indications that the attack may have been delivered to users via spam emails. The attack commences with a…
-
Rain Technology protects consumers against visual hackers and snoopers at ATM terminals
Rain Technology protects consumers against visual hackers and snoopers at ATM terminals 2024-09-13 at 12:01 By Industry News Rain Technology announced ATM Switchable Privacy, designed to protect consumers against visual hackers and snoopers at ATM terminals in financial institutions, retail stores, restaurants, airports, and other public settings. ATM stats and state of the market With…
-
Nudge Security unveils SSPM capabilities to strengthen SaaS security
Nudge Security unveils SSPM capabilities to strengthen SaaS security 2024-09-13 at 11:01 By Industry News Nudge Security unveiled new SSPM (SaaS security posture management) capabilities for its SaaS security and governance platform. This enhancement creates the industry’s most comprehensive solution of its kind, combining SaaS discovery, security posture management, spend management, third-party risk, and identity governance…
-
OpenAI’s latest o1 model family can emulate ‘reasoning’ – but might overthink things a bit
OpenAI’s latest o1 model family can emulate ‘reasoning’ – but might overthink things a bit 2024-09-13 at 09:46 By Thomas Claburn ‘Chain of thought’ techniques mean latest LLM is better at stepping through complex challenges OpenAI on Thursday introduced o1, its latest large language model family, which it claims is capable of emulating complex reasoning.……
-
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency 2024-09-13 at 09:31 By Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity, which specifically singles out the Oracle Weblogic server, is designed to deliver malware dubbed Hadooken, according to cloud security firm Aqua. “When Hadooken…
-
Japan to put a small red Swedish house on the Moon
Japan to put a small red Swedish house on the Moon 2024-09-13 at 09:16 By Laura Dobberstein No, you read that right Tokyo-headquartered company ispace announced on Thursday it is sending a tiny toy red Swedish house to the Moon.… This article is an excerpt from The Register View Original Source React to this headline:
-
Cambodian senator sanctioned by US over alleged forced labor cyber-scam camps
Cambodian senator sanctioned by US over alleged forced labor cyber-scam camps 2024-09-13 at 08:46 By Simon Sharwood Do not go on holiday to the O Smach Resort The US Department of the Treasury’s Office of Foreign Assets Control issued sanctions on Thursday against Cambodian entrepreneur and senator Ly Yong Phat, for his “role in serious…
-
Australia’s government spent the week boxing Big Tech
Australia’s government spent the week boxing Big Tech 2024-09-13 at 08:01 By Simon Sharwood With social media age limits, anti-scam laws, privacy tweaks, and misinformation rules Elon Musk labelled ‘fascist’ Australia’s government has spent the week reining in Big Tech.… This article is an excerpt from The Register View Original Source React to this headline: