December 2024

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays 2024-12-19 at 17:38 By Brandon Vigliarolo Week-long mission set to stretch into ninth month Two astronauts who traveled to the International Space Station aboard Boeing’s problem-plagued Starliner are facing another extended delay. … This article is an excerpt from The Register […]

React to this headline:

Loading spinner

Stranded in space: Starliner crew to remain in orbit even longer as SpaceX faces delays Read More »

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now 2024-12-19 at 17:19 By Brooke Kato The warning comes a week after the FBI said cybercriminals, suspected to be from China, hacked into AT&T, T-Mobile and Verizon to spy on customers. This article is an excerpt from Latest Technology News and Product

React to this headline:

Loading spinner

Feds issue another warning about texting dangers — the scary reason to stop using two-factor authentication now Read More »

Cryptocurrency hackers stole $2.2 billion from platforms in 2024

Cryptocurrency hackers stole $2.2 billion from platforms in 2024 2024-12-19 at 17:18 By Zeljka Zorz $2.2 billion worth of cryptocurrency was stolen from various platforms in 2024, Chainalysis’ 2025 Crypto Crime Report has revealed. Of that sum, $1.34 billion was stolen by North Korea-affiliated hackers, across 47 hacking incidents (out of 303). Most targeted organizations

React to this headline:

Loading spinner

Cryptocurrency hackers stole $2.2 billion from platforms in 2024 Read More »

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools 2024-12-19 at 17:18 By Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve

React to this headline:

Loading spinner

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools Read More »

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture 2024-12-19 at 16:03 By Email is the #1 attack vector, responsible for 90% of phishing incidents. Business Email Compromise (BEC) attacks led to $3 billion in losses in 2023. A multi-layered email security solution like Trustwave MailMarshal can reduce risks effectively. Fact: An organization

React to this headline:

Loading spinner

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture Read More »

Apple and Meta trade barbs over interoperability requests

Apple and Meta trade barbs over interoperability requests 2024-12-19 at 15:48 By Richard Speed Both are only thinking about the best interests of users, of course The European Commission (EC) has continued pushing Apple to open up more of iOS to third parties, and Apple has pushed back, warning that doing so risks user privacy.…

React to this headline:

Loading spinner

Apple and Meta trade barbs over interoperability requests Read More »

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords 2024-12-19 at 15:48 By Juniper Networks is warning that Session Smart Router (SSR) products with default passwords are being targeted as part of a malicious campaign that deploys the Mirai botnet malware. The company said it’s issuing the advisory after “several customers” reported anomalous

React to this headline:

Loading spinner

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords Read More »

NETSCOUT uses AI/ML technology to secure critical IT infrastructure

NETSCOUT uses AI/ML technology to secure critical IT infrastructure 2024-12-19 at 15:33 By Industry News NETSCOUT updates its Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM) products as part of its Adaptive DDoS Protection Solution to combat AI-enabled DDoS threats and protect critical IT infrastructure. DDoS threats and protect critical IT infrastructure. NETSCOUT’s DDoS

React to this headline:

Loading spinner

NETSCOUT uses AI/ML technology to secure critical IT infrastructure Read More »

CISA orders federal agencies to secure their Microsoft cloud environments

CISA orders federal agencies to secure their Microsoft cloud environments 2024-12-19 at 15:04 By Zeljka Zorz The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implementing Secure Practices for Cloud Services

React to this headline:

Loading spinner

CISA orders federal agencies to secure their Microsoft cloud environments Read More »

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products 

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  2024-12-19 at 14:18 By Ashish Khaitan Europe embarks on a new chapter in cybersecurity with the entry into force of the Cyber Resilience Act (CRA). This marks the first-ever EU legislation addressing cybersecurity across a broad range of digital products. The CRA will

React to this headline:

Loading spinner

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  Read More »

Legit Security provides insights into the enterprise’s secrets posture

Legit Security provides insights into the enterprise’s secrets posture 2024-12-19 at 14:18 By Industry News Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions taken

React to this headline:

Loading spinner

Legit Security provides insights into the enterprise’s secrets posture Read More »

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits 2024-12-19 at 14:03 By Fortinet has issued an advisory for a now-patched critical security flaw impacting Wireless LAN Manager (FortiWLM) that could lead to disclosure of sensitive information. The vulnerability, tracked as CVE-2023-34990, carries a CVSS score of 9.6 out of a

React to this headline:

Loading spinner

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits Read More »

Watchdog deep-sixes job ad that was actually pay-to-play training course

Watchdog deep-sixes job ad that was actually pay-to-play training course 2024-12-19 at 13:48 By Richard Speed Misleading listing on a recruitment site? Whatever next? The UK Advertising Standards Authority (ASA) has slapped IT Career Change Ltd on the wrist over a September 2024 ad promoting a career in Health & Safety.… This article is an

React to this headline:

Loading spinner

Watchdog deep-sixes job ad that was actually pay-to-play training course Read More »

Top 10 Industries Targeted by Threat Actors in 2024 

Top 10 Industries Targeted by Threat Actors in 2024  2024-12-19 at 13:20 By Ashish Khaitan As cyber threats continue to evolve, threat actors are refining their techniques and focusing on industries that hold valuable information or play critical roles in society. From ransomware attacks paralyzing operations to data breaches compromising millions of individuals, no sector

React to this headline:

Loading spinner

Top 10 Industries Targeted by Threat Actors in 2024  Read More »

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass 2024-12-19 at 12:04 View original post at Safety Detectives A critical zero-day vulnerability has been discovered in Windows Server 2012 and Server 2012 R2, enabling attackers to bypass the Mark of the Web (MotW) security feature. This flaw, undetected for over two years, poses

React to this headline:

Loading spinner

Critical Zero-Day Vulnerability in Windows Server 2012 Allows MotW Security Bypass Read More »

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist 2024-12-19 at 12:04 View original post at Safety Detectives Radiant Capital, a decentralized finance (DeFi) project, has confirmed that a North Korean threat actor orchestrated the $50 million heist it suffered in October. The revelation comes after an in-depth investigation involving cybersecurity firm Mandiant, which attributed

React to this headline:

Loading spinner

Investigation: North Korean Hackers Behind $50M Radiant Capital Heist Read More »

Ukrainian hacker gets prison for infostealer operations

Ukrainian hacker gets prison for infostealer operations 2024-12-19 at 12:03 By Help Net Security Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS). Individuals who deployed Raccoon Infostealer

React to this headline:

Loading spinner

Ukrainian hacker gets prison for infostealer operations Read More »

CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01

CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01 2024-12-19 at 12:03 By The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01, ordering federal civilian agencies to secure their cloud environments and abide by Secure Cloud Business Applications (SCuBA) secure configuration baselines. “Recent cybersecurity incidents

React to this headline:

Loading spinner

CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01 Read More »

Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency

Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency 2024-12-19 at 12:03 By The Dutch Data Protection Authority (DPA) on Wednesday fined video on-demand streaming service Netflix €4.75 million ($4.93 million) for not giving consumers enough information about how it used their data between 2018 and 2020. An investigation launched by the

React to this headline:

Loading spinner

Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency Read More »

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App 2024-12-19 at 12:03 By The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed that a threat actor it tracks as UAC-0125 is leveraging Cloudflare Workers service to trick military personnel in the country into downloading malware disguised as Army+, a mobile app that

React to this headline:

Loading spinner

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App Read More »

Buy Me A Coffee
Thank you for visiting!