July 2024

Hackers Leak Data of 440,000 Taylor Swift Tickets

Hackers Leak Data of 440,000 Taylor Swift Tickets 2024-07-10 at 10:37 By Keira Waddell Hackers have gained access to 440,000 Taylor Swift Eras Tour tickets, and are demanding a multi-million dollar ransom from Ticketmaster. The hacker group, ShinyHunters, announced on BreachForums that they possess barcode data for hundreds of thousands of tickets and are threatening […]

React to this headline:

Loading spinner

Hackers Leak Data of 440,000 Taylor Swift Tickets Read More »

‘Protected Health Information’ Stolen in HealthEquity Breach

‘Protected Health Information’ Stolen in HealthEquity Breach 2024-07-10 at 10:36 By Hendrik Human On July 2, 2024, Health tech provider HealthEquity disclosed a data breach involving unauthorized access to customers’ protected health information via a compromised third-party vendor account. The breach was detected on March 25 and involved HealthEquity’s SharePoint data. The incident, affecting 23,000

React to this headline:

Loading spinner

‘Protected Health Information’ Stolen in HealthEquity Breach Read More »

Nearly 39 Million Records Were Exposed Online by Legal Services and Technology Company

Nearly 39 Million Records Were Exposed Online by Legal Services and Technology Company 2024-07-10 at 10:36 By Jeremiah Fowler Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password-protected database that contained 38.6 million records belonging to Rapid Legal — a legal support services company that offers court filing, process serving, and document

React to this headline:

Loading spinner

Nearly 39 Million Records Were Exposed Online by Legal Services and Technology Company Read More »

Twilio Breach Exposes Millions of Authy Users’ Data

Twilio Breach Exposes Millions of Authy Users’ Data 2024-07-10 at 10:36 By Husain Parvez Twilio, the U.S. messaging giant, has confirmed a significant data breach in which hackers stole 33 million phone numbers from Authy, its two-factor authentication app. The breach, linked to the notorious hacking group ShinyHunters, was facilitated by an unauthenticated API endpoint

React to this headline:

Loading spinner

Twilio Breach Exposes Millions of Authy Users’ Data Read More »

Over 2.5 Million Affected by Prudential Financial Data Breach

Over 2.5 Million Affected by Prudential Financial Data Breach 2024-07-10 at 10:36 By Husain Parvez Prudential Financial, a major US life insurance provider, has revealed that a data breach in February 2024 has compromised the personal information of over 2.5 million individuals, a significant increase from the initially reported 36,000. The breach, detected on February

React to this headline:

Loading spinner

Over 2.5 Million Affected by Prudential Financial Data Breach Read More »

Big Tech’s eventual response to my LLM-crasher bug report was dire

Big Tech’s eventual response to my LLM-crasher bug report was dire 2024-07-10 at 10:31 By Mark Pesce Fixes have been made, it appears, but disclosure or discussion is invisible Column  Found a bug? It turns out that reporting it with a story in The Register works remarkably well … mostly. After publication of my “Kryptonite”

React to this headline:

Loading spinner

Big Tech’s eventual response to my LLM-crasher bug report was dire Read More »

ViperSoftX variant spotted abusing .NET runtime to disguise data theft

ViperSoftX variant spotted abusing .NET runtime to disguise data theft 2024-07-10 at 09:31 By Brandon Vigliarolo Freeware AutoIt also used to hide entire PowerShell environments in scripts A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix.… This article is an excerpt from

React to this headline:

Loading spinner

ViperSoftX variant spotted abusing .NET runtime to disguise data theft Read More »

ViperSoftX Malware Disguises as eBooks on Torrents to Spread Stealthy Attacks

ViperSoftX Malware Disguises as eBooks on Torrents to Spread Stealthy Attacks 2024-07-10 at 09:31 By The sophisticated malware known as ViperSoftX has been observed being distributed as eBooks over torrents. “A notable aspect of the current variant of ViperSoftX is that it uses the Common Language Runtime (CLR) to dynamically load and run PowerShell commands,

React to this headline:

Loading spinner

ViperSoftX Malware Disguises as eBooks on Torrents to Spread Stealthy Attacks Read More »

Europe blasts back into the heavy launch biz with first Ariane 6 flight

Europe blasts back into the heavy launch biz with first Ariane 6 flight 2024-07-10 at 09:01 By Simon Sharwood Everything went fine, except the experimental re-ignition The European Space Agency’s new launcher, the Ariane 6, completed its maiden flight on Tuesday.… This article is an excerpt from The Register View Original Source React to this

React to this headline:

Loading spinner

Europe blasts back into the heavy launch biz with first Ariane 6 flight Read More »

China pushes for network upgrade blitz as IPv6 adoption slows

China pushes for network upgrade blitz as IPv6 adoption slows 2024-07-10 at 08:31 By Simon Sharwood Almost 800 million use the protocol, with more to come as Wi-Fi mandate arrives China’s adoption of IPv6 – a goal the government in Beijing has prioritized – appears to have slowed.… This article is an excerpt from The

React to this headline:

Loading spinner

China pushes for network upgrade blitz as IPv6 adoption slows Read More »

Diversifying cyber teams to tackle complex threats

Diversifying cyber teams to tackle complex threats 2024-07-10 at 08:01 By Help Net Security Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahorse which lures victims into investment scams, to a self-replicating AI worm that uses the likes of

React to this headline:

Loading spinner

Diversifying cyber teams to tackle complex threats Read More »

Accenture buys Indian chip design firm to expand semiconductor smarts

Accenture buys Indian chip design firm to expand semiconductor smarts 2024-07-10 at 07:31 By Laura Dobberstein 450 Excelmax Technologies employees to get new badges Global professional services company Accenture on Monday announced the acquisition of India-based semiconductor design services provider Excelmax Technologies.… This article is an excerpt from The Register View Original Source React to

React to this headline:

Loading spinner

Accenture buys Indian chip design firm to expand semiconductor smarts Read More »

How companies increase risk exposure with rushed LLM deployments

How companies increase risk exposure with rushed LLM deployments 2024-07-10 at 07:31 By Mirko Zorz In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and vulnerabilities as they rush to deploy LLMs. King explains how LLMs pose significant risks to data

React to this headline:

Loading spinner

How companies increase risk exposure with rushed LLM deployments Read More »

Ticketmaster tickets leaked for Taylor Swift concerts and more

Ticketmaster tickets leaked for Taylor Swift concerts and more 2024-07-10 at 07:16 By The extortion campaign against Ticketmaster continues with 166,000 Taylor Swift ticket barcodes leaked.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Ticketmaster tickets leaked for Taylor Swift concerts and more Read More »

New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk

New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk 2024-07-10 at 07:16 By Select versions of the OpenSSH secure networking suite are susceptible to a new vulnerability that can trigger remote code execution (RCE). The vulnerability, tracked as CVE-2024-6409 (CVSS score: 7.0), is distinct from CVE-2024-6387 (aka RegreSSHion) and relates to a case of code

React to this headline:

Loading spinner

New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk Read More »

BunkerWeb: Open-source Web Application Firewall (WAF)

BunkerWeb: Open-source Web Application Firewall (WAF) 2024-07-10 at 07:01 By Mirko Zorz BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and the community. “The genesis of BunkerWeb comes from the following problem: every time someone from my team

React to this headline:

Loading spinner

BunkerWeb: Open-source Web Application Firewall (WAF) Read More »

RADIUS networking protocol blasted into submission through MD5-based flaw

RADIUS networking protocol blasted into submission through MD5-based flaw 2024-07-10 at 06:31 By Connor Jones If someone can do a little MITM’ing and hash cracking, they can log in with no valid password needed Cybersecurity experts at universities and Big Tech have disclosed a vulnerability in a common client-server networking protocol that allows snoops to

React to this headline:

Loading spinner

RADIUS networking protocol blasted into submission through MD5-based flaw Read More »

Cybersecurity jobs available right now: July 10, 2024

Cybersecurity jobs available right now: July 10, 2024 2024-07-10 at 06:31 By Anamarija Pogorelec CISO HoneyBook | Israel | On-site – View job details As a CISO, you will develop and implement a multi-year security strategy and roadmap to anticipate and address security challenges in alignment with company growth objectives. Ensure that HoneyBook adheres to

React to this headline:

Loading spinner

Cybersecurity jobs available right now: July 10, 2024 Read More »

Scroll to Top