January 2024

Security Experts Describe AI Technologies They Want to See

Security Experts Describe AI Technologies They Want to See 2024-01-22 at 19:32 By Ryan Naraine SecurityWeek interviews a wide spectrum of security experts on AI-driven cybersecurity use-cases that are worth immediate attention. The post Security Experts Describe AI Technologies They Want to See appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS […]

React to this headline:

Loading spinner

Security Experts Describe AI Technologies They Want to See Read More »

Sierra Space bursts full-scale inflatable space habitat module

Sierra Space bursts full-scale inflatable space habitat module 2024-01-22 at 19:17 By Richard Speed Pop goes the test article. As planned Sierra Space has inflated a full-sized test article of its Large Integrated Flexible Environment (LIFE) habitat beyond bursting point to demonstrate how the module might behave in the harsh environment of space.… This article

React to this headline:

Loading spinner

Sierra Space bursts full-scale inflatable space habitat module Read More »

North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor

North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor 2024-01-22 at 19:01 By Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a new campaign orchestrated by a threat actor known as ScarCruft in December 2023. “ScarCruft has been experimenting with new infection chains, including the use of a

React to this headline:

Loading spinner

North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor Read More »

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries 2024-01-22 at 19:01 By Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to projects can be hijacked through domain name purchases and

React to this headline:

Loading spinner

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries Read More »

EFF adds Street Surveillance Hub so Americans can check who’s checking on them

EFF adds Street Surveillance Hub so Americans can check who’s checking on them 2024-01-22 at 18:32 By Iain Thomson ‘The federal government has almost entirely abdicated its responsibility’ For a country that prides itself on being free, America does seem to have an awful lot of spying going on, as the new Street Surveillance Hub

React to this headline:

Loading spinner

EFF adds Street Surveillance Hub so Americans can check who’s checking on them Read More »

Hackers Targeting Critical Atlassian Confluence Vulnerability Days After Disclosure

Hackers Targeting Critical Atlassian Confluence Vulnerability Days After Disclosure 2024-01-22 at 18:16 By Eduard Kovacs The Atlassian Confluence vulnerability CVE-2023-22527 is being exploited in the wild just days after it was disclosed.  The post Hackers Targeting Critical Atlassian Confluence Vulnerability Days After Disclosure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Hackers Targeting Critical Atlassian Confluence Vulnerability Days After Disclosure Read More »

Florida man touts central bank digital currency conspiracy theory in re-election bid

Florida man touts central bank digital currency conspiracy theory in re-election bid 2024-01-22 at 18:02 By Laura Dobberstein Talking points echo those of Ramaswamy and DeSantis as they drop out of the race A Florida man has chosen the next cultural wars flashpoint he will rally behind in an effort to mobilize the 2024 US

React to this headline:

Loading spinner

Florida man touts central bank digital currency conspiracy theory in re-election bid Read More »

Burnout epidemic proves there’s too much Rust on the gears of open source

Burnout epidemic proves there’s too much Rust on the gears of open source 2024-01-22 at 17:31 By Richard Speed Spotting and tackling a widespread problem is a challenge Open source burnout has reared its head once again, this time in relation to the Rust project. However, the issue is not new, nor are the solutions.…

React to this headline:

Loading spinner

Burnout epidemic proves there’s too much Rust on the gears of open source Read More »

Ivanti and Juniper Networks accused of bending the rules with CVE assignments

Ivanti and Juniper Networks accused of bending the rules with CVE assignments 2024-01-22 at 17:16 By Connor Jones Critics claim now-fixed vulnerabilities weren’t disclosed, flag up grouping of multiple flaws under one CVE Critics are accusing major tech companies of not sticking to the rules when it comes to registering vulnerabilities with the appropriate authorities.…

React to this headline:

Loading spinner

Ivanti and Juniper Networks accused of bending the rules with CVE assignments Read More »

LoanDepot Breach: 16.6 Million People Impacted

LoanDepot Breach: 16.6 Million People Impacted 2024-01-22 at 17:16 By SecurityWeek News Lending giant LoanDepot (NYSE: LDI) said that roughly 16.6 million individuals were impacted as a result of a ransomware attack. The post LoanDepot Breach: 16.6 Million People Impacted appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

LoanDepot Breach: 16.6 Million People Impacted Read More »

New NTLM Hash Leak Attacks Target Outlook, Windows Programs

New NTLM Hash Leak Attacks Target Outlook, Windows Programs 2024-01-22 at 17:16 By Eduard Kovacs Varonis finds one vulnerability and three attack methods that can be used to obtain NTLM hashes via Outlook and two Windows programs. The post New NTLM Hash Leak Attacks Target Outlook, Windows Programs appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

New NTLM Hash Leak Attacks Target Outlook, Windows Programs Read More »

White goods giant fires legal threats to unplug open source plugin

White goods giant fires legal threats to unplug open source plugin 2024-01-22 at 16:32 By Richard Speed ‘Substantial increase in AWS calls’ triggers takedown notice A plugin and library to permit the control of Haier, Candy, and Hoover appliances recently received takedown requests from Haier Europe’s Security and Governance department.… This article is an excerpt

React to this headline:

Loading spinner

White goods giant fires legal threats to unplug open source plugin Read More »

Netskope introduces SASE solution for midmarket enterprises

Netskope introduces SASE solution for midmarket enterprises 2024-01-22 at 16:31 By Industry News Netskope announced the next addition to its family of single-vendor SASE offerings, focused on midmarket organizations and the Managed Service Providers (MSP) that serve them. The ongoing expansion of Netskope’s SASE portfolio enables Netskope and its partners to deliver a complete range

React to this headline:

Loading spinner

Netskope introduces SASE solution for midmarket enterprises Read More »

Threat Actors Target US Asylum Seekers with MetaStealer Malware

Threat Actors Target US Asylum Seekers with MetaStealer Malware 2024-01-22 at 16:17 By cybleinc Threat Actors Target US Asylum Seekers with MetaStealer Malware Key Takeaways Cyble Research and Intelligence Labs (CRIL) came across a ZIP archive file that could be downloaded from a URL and possibly disseminated through spam emails. Within the ZIP file lies

React to this headline:

Loading spinner

Threat Actors Target US Asylum Seekers with MetaStealer Malware Read More »

Subway’s data torpedoed by LockBit, ransomware gang claims

Subway’s data torpedoed by LockBit, ransomware gang claims 2024-01-22 at 16:02 By Connor Jones Fast food chain could face a footlong recovery process if allegations are true The LockBit ransomware gang is claiming an attack on submarine sandwich slinger Subway, alleging it has made off with a platter of data.… This article is an excerpt

React to this headline:

Loading spinner

Subway’s data torpedoed by LockBit, ransomware gang claims Read More »

Cognyte adds GenAI capabilities into its LUMINAR offering

Cognyte adds GenAI capabilities into its LUMINAR offering 2024-01-22 at 16:02 By Industry News Cognyte announced the release of a significant update to its LUMINAR external threat intelligence solution to incorporate GenAI capabilities, including a new AI-driven dashboard. LUMINAR is already integrated with Cognyte’s investigative analytics software and other leading solutions, and this release brings

React to this headline:

Loading spinner

Cognyte adds GenAI capabilities into its LUMINAR offering Read More »

Attackers can steal NTLM password hashes via calendar invites

Attackers can steal NTLM password hashes via calendar invites 2024-01-22 at 15:46 By Zeljka Zorz A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes can be exploited by adding two headers to an email carrying a specially crafted file, security researcher Dolev Taler has

React to this headline:

Loading spinner

Attackers can steal NTLM password hashes via calendar invites Read More »

Politicos demand full list of Fujitsu’s public sector contract wins in wake of Post Office scandal

Politicos demand full list of Fujitsu’s public sector contract wins in wake of Post Office scandal 2024-01-22 at 15:33 By Lindsay Clark Committee wants to know which were awarded without competition and more British MPs have written to the country’s Treasury to demand details of all public sector contracts with Fujitsu as the Japanese tech

React to this headline:

Loading spinner

Politicos demand full list of Fujitsu’s public sector contract wins in wake of Post Office scandal Read More »

F5 appoints Samir Sherif as CISO

F5 appoints Samir Sherif as CISO 2024-01-22 at 15:01 By Industry News F5 announced the appointment of Samir Sherif as SVP and CISO. In this role, Sherif will lead F5’s enterprise cybersecurity strategy and security culture, evolve F5’s security capabilities and resilience, oversee cybersecurity standards and programs for F5’s products and services, and showcase to

React to this headline:

Loading spinner

F5 appoints Samir Sherif as CISO Read More »

Scroll to Top