2024

The intersection of cybersecurity and artificial intelligence

The intersection of cybersecurity and artificial intelligence 2024-01-15 at 07:16 By Artificial intelligence (AI) is a valuable cybersecurity asset, but it’s not a silver bullet. To best leverage AI, we must consider the security teams of the future. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to […]

React to this headline:

Loading spinner

The intersection of cybersecurity and artificial intelligence Read More »

Adalanche: Open-source Active Directory ACL visualizer, explorer

Adalanche: Open-source Active Directory ACL visualizer, explorer 2024-01-15 at 07:01 By Mirko Zorz Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool for visualizing and investigating potential account, machine, or domain takeovers. Additionally, it helps identify and display any misconfigurations. What unique features make

React to this headline:

Loading spinner

Adalanche: Open-source Active Directory ACL visualizer, explorer Read More »

Key elements for a successful cyber risk management strategy

Key elements for a successful cyber risk management strategy 2024-01-15 at 06:32 By Mirko Zorz In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel anticipates a growing pressure on organizations

React to this headline:

Loading spinner

Key elements for a successful cyber risk management strategy Read More »

Government organizations’ readiness in the face of cyber threats

Government organizations’ readiness in the face of cyber threats 2024-01-15 at 06:01 By Help Net Security Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive data. These threats are diverse in nature, originating from various actors such as nation-states, hacktivist groups, and organized cybercrime entities.

React to this headline:

Loading spinner

Government organizations’ readiness in the face of cyber threats Read More »

China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol

China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol 2024-01-15 at 05:03 By Simon Sharwood Infosec academic suggests Beijing’s warning that iThing owners aren’t anonymous deserves attention outside the great firewall, too In June 2023 China made a typically bombastic announcement: operators of short-distance ad hoc networks must ensure they

React to this headline:

Loading spinner

China loathes AirDrop so much it’s publicized an old flaw in Apple’s P2P protocol Read More »

New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks

New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks 2024-01-14 at 11:46 By The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of the Russia-linked Sandworm hacking group, new findings from Forescout show. The intrusions, which targeted around 22 Danish energy organizations in May 2023, occurred in two distinct waves, one

React to this headline:

Loading spinner

New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks Read More »

Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days

Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days 2024-01-14 at 09:33 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Social engineer reveals effective tricks for real-world intrusions In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer

React to this headline:

Loading spinner

Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days Read More »

NASA, Lockheed Martin reveal subtly supersonic X-59 plane

NASA, Lockheed Martin reveal subtly supersonic X-59 plane 2024-01-13 at 16:17 By Thomas Claburn Boffins say the quiet part out loud: There’s no room for the sonic boom NASA’s X-59 quiet supersonic aircraft made its public debut on Friday in a media event at the Lockheed Martin Skunk Works in Palmdale, California, where the plane

React to this headline:

Loading spinner

NASA, Lockheed Martin reveal subtly supersonic X-59 plane Read More »

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches 2024-01-13 at 13:47 By Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series firewalls and EX Series switches. The issue, tracked as CVE-2024-21591, is rated 9.8 on the CVSS scoring system. “An out-of-bounds write vulnerability in

React to this headline:

Loading spinner

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches Read More »

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services 2024-01-13 at 12:31 By A 29-year-old Ukrainian national has been arrested in connection with running a “sophisticated cryptojacking scheme,” netting them over $2 million (€1.8 million) in illicit profits. The person was apprehended in Mykolaiv, Ukraine, on January 9 by the National Police of Ukraine with

React to this headline:

Loading spinner

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services Read More »

Why do IT projects like the UK’s scandal-hit Post Office Horizon end in disaster?

Why do IT projects like the UK’s scandal-hit Post Office Horizon end in disaster? 2024-01-13 at 10:47 By Chris Williams Lack of skills, funding, and scrutiny – pick three Kettle  This week the incredible scandal that is the UK’s Post Office Horizon computer system, which ruined people’s lives and drove some to suicide, finally exploded

React to this headline:

Loading spinner

Why do IT projects like the UK’s scandal-hit Post Office Horizon end in disaster? Read More »

Number of orgs compromised via Ivanti VPN zero-days grows as Mandiant weighs in

Number of orgs compromised via Ivanti VPN zero-days grows as Mandiant weighs in 2024-01-13 at 04:31 By Jessica Lyons Hardcastle Snoops had no fewer than five custom bits of malware to hand to backdoor networks Two zero-day bugs in Ivanti products were likely under attack by cyberspies as early as December, according to Mandiant’s threat

React to this headline:

Loading spinner

Number of orgs compromised via Ivanti VPN zero-days grows as Mandiant weighs in Read More »

This is why we update… Data-thief malware exploits unpatched Windows PCs

This is why we update… Data-thief malware exploits unpatched Windows PCs 2024-01-13 at 02:00 By Jessica Lyons Hardcastle Phemedrone Stealer loots drives for passwords, cookies, login tokens, etc Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information – passwords, cookies,

React to this headline:

Loading spinner

This is why we update… Data-thief malware exploits unpatched Windows PCs Read More »

GitHub Copilot copyright case narrowed but not neutered

GitHub Copilot copyright case narrowed but not neutered 2024-01-13 at 00:17 By Thomas Claburn Microsoft and OpenAI fail to shake off AI infringement allegations The judge overseeing the AI code-copying case filed against GitHub, OpenAI, and Microsoft has dismissed some but not all of the aggrieved developers’ claims, leaving the plaintiffs a more limited but

React to this headline:

Loading spinner

GitHub Copilot copyright case narrowed but not neutered Read More »

Exploit for under-siege SharePoint vuln reportedly in hands of ransomware crew

Exploit for under-siege SharePoint vuln reportedly in hands of ransomware crew 2024-01-12 at 21:47 By Connor Jones It’s taken months for crims to hack together a working exploit chain Security experts claim ransomware criminals have got their hands on a functional exploit for a nearly year-old critical Microsoft SharePoint vulnerability that was this week added

React to this headline:

Loading spinner

Exploit for under-siege SharePoint vuln reportedly in hands of ransomware crew Read More »

Alabama law firm issues data breach notification

Alabama law firm issues data breach notification 2024-01-12 at 21:01 By An Alabama-based law firm announced that the company experienced a data breach affecting client information, including insurance information. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Alabama law firm issues data breach notification Read More »

Google to lay Asia-Pacific to South America undersea cable

Google to lay Asia-Pacific to South America undersea cable 2024-01-12 at 20:46 By Laura Dobberstein Humboldt cable to zoom from Chile to Australia through the South Pacific Google says it is building the first ever subsea cable connecting South America to Asia-Pacific, in partnership with Chilean state-run infrastructure fund Desarrollo Pais and the Office of

React to this headline:

Loading spinner

Google to lay Asia-Pacific to South America undersea cable Read More »

Secret multimillion-dollar cryptojacker snared by Ukrainian police

Secret multimillion-dollar cryptojacker snared by Ukrainian police 2024-01-12 at 19:31 By Connor Jones Criminal scored $2M in crypto proceeds but ends up in ‘cuffs following property raid The criminal thought to be behind a multimillion-dollar cryptojacking scheme is in custody following a Europol-led investigation.… This article is an excerpt from The Register View Original Source

React to this headline:

Loading spinner

Secret multimillion-dollar cryptojacker snared by Ukrainian police Read More »

US tech innovation dreams soured by changed R&D tax laws

US tech innovation dreams soured by changed R&D tax laws 2024-01-12 at 18:47 By Brandon Vigliarolo But Congress is on top of that, right? A US federal tax change that took effect in 2022 thanks to a time-triggered portion of the Trump-era Tax Cuts and Jobs Act may leave entrepreneurs with massive tax bills. … This

React to this headline:

Loading spinner

US tech innovation dreams soured by changed R&D tax laws Read More »

Scroll to Top