2024

Brad Arkin is New Chief Trust Officer at Salesforce

Brad Arkin is New Chief Trust Officer at Salesforce 2024-01-12 at 18:31 By SecurityWeek News Veteran cybersecurity leader Brad Arkin has left Cisco and is joining Salesforce as SVP and Chief Trust Officer. The post Brad Arkin is New Chief Trust Officer at Salesforce appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Brad Arkin is New Chief Trust Officer at Salesforce Read More »

Going green Hertz: Rental giant axes third of EV fleet over lack of demand

Going green Hertz: Rental giant axes third of EV fleet over lack of demand 2024-01-12 at 17:31 By Richard Speed Company expects $245 million hit due to depreciation Rental giant Hertz is backing away from electric vehicles (EVs) and plans to sell off a third of its global fleet of battery-powered cars.… This article is

React to this headline:

Loading spinner

Going green Hertz: Rental giant axes third of EV fleet over lack of demand Read More »

Sneaky Azorult Back in Action and Goes Undetected

Sneaky Azorult Back in Action and Goes Undetected 2024-01-12 at 17:31 By dakshsharma16 Key Takeaways Overview First identified in 2016, Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details. Additionally, it can function as a downloader for other malware families. This malicious software was offered

React to this headline:

Loading spinner

Sneaky Azorult Back in Action and Goes Undetected Read More »

Laptop Maker Framework Says Customer Data Stolen in Third-Party Breach

Laptop Maker Framework Says Customer Data Stolen in Third-Party Breach 2024-01-12 at 17:31 By Ionut Arghire Device maker Framework is notifying users that their personal information was stolen in a data breach at its external accounting partner. The post Laptop Maker Framework Says Customer Data Stolen in Third-Party Breach appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Laptop Maker Framework Says Customer Data Stolen in Third-Party Breach Read More »

Media experts cry foul over AI’s free lunch of copyrighted content

Media experts cry foul over AI’s free lunch of copyrighted content 2024-01-12 at 17:02 By Katyanna Quach US senators want to know how chatbots represent an existential crisis to journalism and democracy Tech companies should compensate news publishers for training AI models on their copyrighted content, media experts told senators in a hearing this week.…

React to this headline:

Loading spinner

Media experts cry foul over AI’s free lunch of copyrighted content Read More »

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw 2024-01-12 at 16:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: WEF releases a cybersecurity report with unsurprising findings, and KyberSlash cryptography vulnerabilities. The post In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw Read More »

Akira ransomware attackers are wiping NAS and tape backups

Akira ransomware attackers are wiping NAS and tape backups 2024-01-12 at 16:17 By Helga Labus “The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 reports of Akira

React to this headline:

Loading spinner

Akira ransomware attackers are wiping NAS and tape backups Read More »

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families 2024-01-12 at 16:17 By As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since early December 2023. “These families allow the threat actors to circumvent authentication and

React to this headline:

Loading spinner

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families Read More »

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion 2024-01-12 at 16:17 By The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on the dark web in February 2023 to publish sensitive data of victims who are unwilling to agree to their demands.

React to this headline:

Loading spinner

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion Read More »

Microsoft suggests command line fiddling to get faulty Windows 10 update installed

Microsoft suggests command line fiddling to get faulty Windows 10 update installed 2024-01-12 at 16:03 By Richard Speed Unhelpful error codes, complex fixes … When did Windows turn into Linux? Microsoft sent yet another problematic patch into the wild this week in the form of KB5034441. However, rather than deal with a BitLocker vulnerability, the

React to this headline:

Loading spinner

Microsoft suggests command line fiddling to get faulty Windows 10 update installed Read More »

Disparate systems: The importance of closing the gap

Disparate systems: The importance of closing the gap 2024-01-12 at 16:03 By Are you getting the most out of your security system? This is a question that many security leaders should be asking themselves and their employees. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Disparate systems: The importance of closing the gap Read More »

So, are we going to talk about how GitHub is an absolute boon for malware, or nah?

So, are we going to talk about how GitHub is an absolute boon for malware, or nah? 2024-01-12 at 15:17 By Thomas Claburn Microsoft says it’s doing its best to crack down on crims The popularity of Github has made it too big to block, which is a boon to dissidents ducking government censors but

React to this headline:

Loading spinner

So, are we going to talk about how GitHub is an absolute boon for malware, or nah? Read More »

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR 2024-01-12 at 15:01 By For years, Microsoft has been making significant inroads in the security space, earning number-one rankings from top industry analyst firms  IDC and Forrester for its endpoint and extended detection and response (XDR) security tools. Taking full advantage of these

React to this headline:

Loading spinner

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR Read More »

It’s uncertain where personal technology is heading, but judging from CES, it smells

It’s uncertain where personal technology is heading, but judging from CES, it smells 2024-01-12 at 14:32 By Mark Pesce Our vulture spent a week in Las Vegas for CES 2024 – here are his key takeaways Column  Every January in Las Vegas a few hundred thousand folks gather to learn about the latest innovations from

React to this headline:

Loading spinner

It’s uncertain where personal technology is heading, but judging from CES, it smells Read More »

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise 2024-01-12 at 14:31 By Ionut Arghire Researchers detail a CI/CD attack leading to PyTorch releases compromise via GitHub Actions self-hosted runners. The post New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise Read More »

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure 2024-01-12 at 14:31 By Ionut Arghire Researchers find no direct link between Russian APT Sandworm and last year’s attacks on Denmark’s critical infrastructure. The post Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure Read More »

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO 2024-01-12 at 14:31 By Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong shield. Sadly, this image of fortitude remains a pipe dream despite its comforting nature. In the

React to this headline:

Loading spinner

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO Read More »

Data regulator fines HelloFresh £140k for sending 80M+ spams

Data regulator fines HelloFresh £140k for sending 80M+ spams 2024-01-12 at 13:31 By Paul Kunert Messaging menace used text and email to bombard people Food delivery company HelloFresh is nursing a £140,000 ($178k) fine by Britain’s data privacy watchdog after a probe found it had dispatched upwards of a staggering 79 million spam email and

React to this headline:

Loading spinner

Data regulator fines HelloFresh £140k for sending 80M+ spams Read More »

Scroll to Top