August 2023

India launches contest to build homegrown web browser

India launches contest to build homegrown web browser 10/08/2023 at 07:02 By Simon Sharwood Almost certainly based on a FOSS engine, but with tweaks for the nation’s use cases India’s government has decided the nation needs an indigenous web browser and has launched the Indian Web Browser Development Challenge (IWBDC) to make it happen.… This

React to this headline:

Loading spinner

India launches contest to build homegrown web browser Read More »

Learning from past healthcare breaches to fortify future cybersecurity strategies

Learning from past healthcare breaches to fortify future cybersecurity strategies 10/08/2023 at 07:02 By Help Net Security In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy CISO at Centura Health, who sheds light on the

React to this headline:

Loading spinner

Learning from past healthcare breaches to fortify future cybersecurity strategies Read More »

What to know about FedRAMP Rev. 5 Baselines

What to know about FedRAMP Rev. 5 Baselines 10/08/2023 at 06:31 By Help Net Security In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party

React to this headline:

Loading spinner

What to know about FedRAMP Rev. 5 Baselines Read More »

Private network adoption grows as enterprises seek greater control and security

Private network adoption grows as enterprises seek greater control and security 10/08/2023 at 06:04 By Help Net Security Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a viable alternative to traditional enterprise networks, offering a wide range of benefits,” said Spirent’s principal strategist for

React to this headline:

Loading spinner

Private network adoption grows as enterprises seek greater control and security Read More »

37% of third-party applications have high-risk permissions

37% of third-party applications have high-risk permissions 10/08/2023 at 05:32 By Help Net Security Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an emerging

React to this headline:

Loading spinner

37% of third-party applications have high-risk permissions Read More »

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers 10/08/2023 at 05:19 By Thomas Claburn Seven ex-tweeps bring the receipts, as the kids say Twitter has been sued by seven former employees who allege they were discriminated against on the basis of sex, age, race, and/or for taking medical

React to this headline:

Loading spinner

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers Read More »

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers 10/08/2023 at 03:47 By Thomas Claburn Seven women bring the receipts, as the kids say Twitter has been sued by seven female former employees who allege they were discriminated against on the basis of sex, age, race, and/or for taking

React to this headline:

Loading spinner

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers Read More »

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends 10/08/2023 at 02:32 By Jessica Lyons Hardcastle New international laws needed ‘to bring accountability’ Ukraine’s cybersecurity boss Victor Zhora says he expects Russia’s online attacks against his country – including cyber “war crimes” – will continue long after the physical war ends

React to this headline:

Loading spinner

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends Read More »

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’ 10/08/2023 at 02:19 By Dan Robinson It may actually be the anti-superconductor, quips one research team Enthusiasm over the purported room temperature superconductor LK-99 is waning further as more research teams are unable to reproduce the original findings. In fact, one at a

React to this headline:

Loading spinner

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’ Read More »

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks 10/08/2023 at 02:03 By Tobias Mann It’s like a nesting doll of security flaws AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running vulnerable machine.… This article is

React to this headline:

Loading spinner

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks Read More »

US Supreme Court allows ‘ghost guns’ to fall under federal purview

US Supreme Court allows ‘ghost guns’ to fall under federal purview 10/08/2023 at 01:33 By Brandon Vigliarolo 3D printers beware, Biden’s on the Build-Your-Own-Blunderbuss beat The Biden administration’s crackdown on 3D-printed gun parts can be allowed to be enforced, at least temporarily, after the US Supreme Court voted to let the rule to stand.… This

React to this headline:

Loading spinner

US Supreme Court allows ‘ghost guns’ to fall under federal purview Read More »

CLI-beautifying ANSI escape sequences can also make your log files a security threat

CLI-beautifying ANSI escape sequences can also make your log files a security threat 10/08/2023 at 00:46 By Brandon Vigliarolo When you can’t even cat your telemetry safely, who can you trust? Black Hat  Spend much time working in a command-line terminal and you’re likely to have at least a passing familiarity with ANSI escape sequences.

React to this headline:

Loading spinner

CLI-beautifying ANSI escape sequences can also make your log files a security threat Read More »

X tries to win back advertisers with brand safety promises

X tries to win back advertisers with brand safety promises 10/08/2023 at 00:03 By Brandon Vigliarolo Meanwhile, platform keeps paying creators a share of ad revenue, but without similar safety features The site formerly known as Twitter is trying yet again to lure advertisers back, this time with a series of brand safety concessions that

React to this headline:

Loading spinner

X tries to win back advertisers with brand safety promises Read More »

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you 09/08/2023 at 23:49 By Iain Thomson If you’re so smart, prove it by safeguarding our infrastructure Black Hat  In a surprise announcement at the opening Black Hat keynote today, DARPA unveiled what it’s called an AI Cyber Challenge (AIxCC).

React to this headline:

Loading spinner

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you Read More »

Say hello to Downfall, another data-leaking security hole in several years of Intel chips

Say hello to Downfall, another data-leaking security hole in several years of Intel chips 09/08/2023 at 22:47 By Thomas Claburn It is with a heavy heart that we must announce that the boffins are at it again Black Hat  Googlers have lately found not one but two more security vulnerabilities in Intel and AMD processors

React to this headline:

Loading spinner

Say hello to Downfall, another data-leaking security hole in several years of Intel chips Read More »

Researchers discover algorithm to create shapes that roll down pre-determined paths

Researchers discover algorithm to create shapes that roll down pre-determined paths 09/08/2023 at 22:35 By Lindsay Clark Lopsided solids promise applications in quantum mechanics and medicine Researchers have developed a method to construct solid objects that roll down pre-determined paths, which they reckon could have applications in quantum mechanics and medicine.… This article is an

React to this headline:

Loading spinner

Researchers discover algorithm to create shapes that roll down pre-determined paths Read More »

AgentTesla Malware Targets Users with Malicious Control Panel File

AgentTesla Malware Targets Users with Malicious Control Panel File 09/08/2023 at 22:02 By cybleinc Cyble Research and Intelligence Labs analyzes the distribution method of AgentTesla malware using malicious control panel files. The post AgentTesla Malware Targets Users with Malicious Control Panel File appeared first on Cyble. This article is an excerpt from Cyble View Original

React to this headline:

Loading spinner

AgentTesla Malware Targets Users with Malicious Control Panel File Read More »

Scroll to Top