January 2024

Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report

Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report 2024-01-10 at 14:17 By Eduard Kovacs An engineer recruited by intelligence services used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop. The post Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian […]

React to this headline:

Loading spinner

Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report Read More »

China Says State-Backed Experts Crack Apple’s AirDrop

China Says State-Backed Experts Crack Apple’s AirDrop 2024-01-10 at 14:17 By AFP Chinese state-backed experts have found a way to identify people who use Apple’s encrypted AirDrop messaging service, according to the Beijing municipal government. The post China Says State-Backed Experts Crack Apple’s AirDrop appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

China Says State-Backed Experts Crack Apple’s AirDrop Read More »

Android’s January 2024 Security Update Patches 58 Vulnerabilities

Android’s January 2024 Security Update Patches 58 Vulnerabilities 2024-01-10 at 14:17 By Ionut Arghire Android’s first security update of 2024 resolves high-severity elevation of privilege and information disclosure vulnerabilities. The post Android’s January 2024 Security Update Patches 58 Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Android’s January 2024 Security Update Patches 58 Vulnerabilities Read More »

Getting off the Attack Surface Hamster Wheel: Identity Can Help

Getting off the Attack Surface Hamster Wheel: Identity Can Help 2024-01-10 at 14:17 By IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it.  The process is simple: begin by thoroughly assessing the attack surface, encompassing the entire IT environment.

React to this headline:

Loading spinner

Getting off the Attack Surface Hamster Wheel: Identity Can Help Read More »

Google’s TPUs could end up costing it a billion-plus, thanks to this patent challenge

Google’s TPUs could end up costing it a billion-plus, thanks to this patent challenge 2024-01-10 at 13:47 By Tobias Mann Singular alleges AI accelerators built from ripped-off blueprints Allegations that Google’s Tensor Processing Units (TPUs) were developed using stolen designs are being put to the test as a jury trial brought against the search giant

React to this headline:

Loading spinner

Google’s TPUs could end up costing it a billion-plus, thanks to this patent challenge Read More »

Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims

Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims 2024-01-10 at 13:33 By A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by the malware to regain access to their files. The cybersecurity firm said the threat intelligence it shared with Dutch law enforcement authorities

React to this headline:

Loading spinner

Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims Read More »

NASA’s Artemis Moon missions take a rain check until 2025 and beyond

NASA’s Artemis Moon missions take a rain check until 2025 and beyond 2024-01-10 at 13:17 By Laura Dobberstein Agency still needs to figure out astronaut fashion, among other technical woes NASA’s Moon mission launch dates have slid by about a year – Artemis II to September 2025 and Artemis III to September 2026. Artemis IV,

React to this headline:

Loading spinner

NASA’s Artemis Moon missions take a rain check until 2025 and beyond Read More »

Bluefin enhances ShieldConex with enterprise security proxy service

Bluefin enhances ShieldConex with enterprise security proxy service 2024-01-10 at 13:01 By Industry News Bluefin launched a new ShieldConex capability providing token and/or EMV/P2PE based processing services to any payment processor, as well as protecting Personally Identifiable Information and Protected Health Information (PII/PHI) endpoints. For enterprise merchants looking for a universal solution, the endpoint-agnostic upgrade

React to this headline:

Loading spinner

Bluefin enhances ShieldConex with enterprise security proxy service Read More »

anecdotes raises $25 million to introduce new data-driven innovations to the GRC landscape

anecdotes raises $25 million to introduce new data-driven innovations to the GRC landscape 2024-01-10 at 12:01 By Industry News anecdotes announced that it has closed $25 million in a Series B round of funding, elevating the total capital raised to $55 million. Notably, Vertex and DTCP have joined as new investors, underscoring their belief in

React to this headline:

Loading spinner

anecdotes raises $25 million to introduce new data-driven innovations to the GRC landscape Read More »

Former Post Office boss returns CBE to sender over computer system scandal

Former Post Office boss returns CBE to sender over computer system scandal 2024-01-10 at 11:47 By Lindsay Clark Minister says Fujitsu could be ‘on the hook’ for compensation pending inquiry Former Post Office CEO Paula Vennells, at the center of a media storm in recent days, is returning her CBE* following multiple calls for her

React to this headline:

Loading spinner

Former Post Office boss returns CBE to sender over computer system scandal Read More »

FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data

FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data 2024-01-10 at 11:31 By The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from sharing or selling any sensitive location data with third-parties. The ban is part of a settlement over allegations that the company “sold precise location

React to this headline:

Loading spinner

FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data Read More »

Need to make some 3D models but lack the skill and talent? Say, have you tried… AI?

Need to make some 3D models but lack the skill and talent? Say, have you tried… AI? 2024-01-10 at 10:32 By Chris Williams and Katyanna Quach That’s going to be a recurring question in 2024 Luma, a generative AI startup building software that transforms text descriptions to corresponding 3D models, just raised $43 million (£34

React to this headline:

Loading spinner

Need to make some 3D models but lack the skill and talent? Say, have you tried… AI? Read More »

Cutting-edge microscopy reveals bottled water has ‘up to 100 times’ more bits of plastic than previously feared

Cutting-edge microscopy reveals bottled water has ‘up to 100 times’ more bits of plastic than previously feared 2024-01-10 at 09:47 By Brandon Vigliarolo Gulp! The average store-bought bottle of water contains somewhere in the neighborhood of 10 to 100 times more minute plastic particles than previously believed, judging from a study published this week.… This

React to this headline:

Loading spinner

Cutting-edge microscopy reveals bottled water has ‘up to 100 times’ more bits of plastic than previously feared Read More »

Microsoft’s January 2024 Windows Update Patches 48 New Vulnerabilities

Microsoft’s January 2024 Windows Update Patches 48 New Vulnerabilities 2024-01-10 at 08:02 By Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates for January 2024. Of the 48 bugs, two are rated Critical and 46 are rated Important in severity. There is no evidence that any of

React to this headline:

Loading spinner

Microsoft’s January 2024 Windows Update Patches 48 New Vulnerabilities Read More »

Top LLM vulnerabilities and how to mitigate the associated risk

Top LLM vulnerabilities and how to mitigate the associated risk 2024-01-10 at 07:31 By Help Net Security As large language models (LLMs) become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. But this uncertainty doesn’t mean progress should grind to a halt: Exploring AI is essential to staying competitive, meaning CISOs

React to this headline:

Loading spinner

Top LLM vulnerabilities and how to mitigate the associated risk Read More »

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals 2024-01-10 at 07:02 By Mirko Zorz Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of Fly Catcher, is an enthusiastic pilot, cybersecurity researcher, and tinkerer. She was driven

React to this headline:

Loading spinner

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals Read More »

CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack

CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack 2024-01-10 at 07:02 By The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This includes CVE-2023-27524 (CVSS score: 8.9), a high-severity vulnerability impacting the Apache Superset open-source data visualization software

React to this headline:

Loading spinner

CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack Read More »

Scroll to Top