2024

As lawmakers mull outlawing poor security, what can they really do to tackle online gangs?

As lawmakers mull outlawing poor security, what can they really do to tackle online gangs? 2024-01-04 at 14:01 By Connor Jones Headline-grabbing takedowns are nice, but long-term solutions require short-term sacrifices Comment  In some ways, the ransomware landscape in 2023 remained unchanged from the way it looked in previous years. Vendor reports continue to show […]

React to this headline:

Loading spinner

As lawmakers mull outlawing poor security, what can they really do to tackle online gangs? Read More »

Hacked Mandiant X Account Abused for Cryptocurrency Theft

Hacked Mandiant X Account Abused for Cryptocurrency Theft 2024-01-04 at 13:46 By Eduard Kovacs Mandiant’s account on X, formerly Twitter, was hacked and used to lure users to a cryptocurrency phishing site. The post Hacked Mandiant X Account Abused for Cryptocurrency Theft appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Hacked Mandiant X Account Abused for Cryptocurrency Theft Read More »

RIPE Account Hacking Leads to Major Internet Outage at Orange Spain 

RIPE Account Hacking Leads to Major Internet Outage at Orange Spain  2024-01-04 at 13:46 By Eduard Kovacs Orange Spain’s internet went down for several hours after its RIPE account was hacked, likely after malware stole the credentials. The post RIPE Account Hacking Leads to Major Internet Outage at Orange Spain  appeared first on SecurityWeek. This

React to this headline:

Loading spinner

RIPE Account Hacking Leads to Major Internet Outage at Orange Spain  Read More »

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners 2024-01-04 at 13:32 By Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices. The three harmful packages, named modularseven, driftme, and catme, attracted a total of 431

React to this headline:

Loading spinner

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners Read More »

Fujitsu wins flood contract extension despite starring in TV drama about its failures

Fujitsu wins flood contract extension despite starring in TV drama about its failures 2024-01-04 at 13:01 By Lindsay Clark Deal expanded from £4.5M to £19.5M over 7 years as critics point to shortcomings The UK’s Environment Agency has awarded Fujitsu – the tech biz embroiled in the high-profile Post Office scandal – a £2 million

React to this headline:

Loading spinner

Fujitsu wins flood contract extension despite starring in TV drama about its failures Read More »

Industrial Defender Risk Signal integrates threat intelligence and business context

Industrial Defender Risk Signal integrates threat intelligence and business context 2024-01-04 at 13:01 By Industry News Industrial Defender introduced Industrial Defender Risk Signal, its new risk-based vulnerability management (RBVM) solution. Building upon the company’s robust vulnerability assessment capabilities, Industrial Defender Risk Signal intelligently prioritizes vulnerability for highest impact, integrating threat intelligence and the user’s specific

React to this headline:

Loading spinner

Industrial Defender Risk Signal integrates threat intelligence and business context Read More »

Three Chinese balloons float near Taiwanese airbase

Three Chinese balloons float near Taiwanese airbase 2024-01-04 at 12:16 By Laura Dobberstein Also: Remember that balloon over the US last February? It might have used a US internet provider Four Chinese balloons have reportedly floated over the Taiwan Strait, three of them crossing over the island’s land mass and near its Ching-Chuan-Kang air base

React to this headline:

Loading spinner

Three Chinese balloons float near Taiwanese airbase Read More »

SentinelOne acquires PingSafe to expand cloud security capabilities

SentinelOne acquires PingSafe to expand cloud security capabilities 2024-01-04 at 12:01 By Industry News SentinelOne has agreed to acquire PingSafe. The acquisition of PingSafe’s cloud native application protection platform (CNAPP), when combined with SentinelOne’s cloud workload security and cloud data security capabilities, is expected to provide companies with a fully integrated platform that drives better

React to this headline:

Loading spinner

SentinelOne acquires PingSafe to expand cloud security capabilities Read More »

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT 2024-01-04 at 11:16 By The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade detection from security software. “The group’s weapon of choice is Remcos RAT, a notorious malware for remote surveillance and control, which has

React to this headline:

Loading spinner

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT Read More »

Google to start third-party cookie cull for 30 million Chrome users

Google to start third-party cookie cull for 30 million Chrome users 2024-01-04 at 10:31 By Thomas Claburn One of the ad APIs that will fill the void – Protected Audience – may actually improve privacy From today there will be a great disturbance in Chrome – as if millions of browser cookies suddenly cried out

React to this headline:

Loading spinner

Google to start third-party cookie cull for 30 million Chrome users Read More »

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack 2024-01-04 at 08:46 By American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six hours by an unknown attacker to propagate a cryptocurrency scam. As of writing, the account has been restored on the social media platform. It’s currently

React to this headline:

Loading spinner

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack Read More »

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts 2024-01-04 at 07:31 By Mirko Zorz DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “While engaged

React to this headline:

Loading spinner

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts Read More »

15 open-source cybersecurity tools you’ll wish you’d known earlier

15 open-source cybersecurity tools you’ll wish you’d known earlier 2024-01-04 at 07:01 By Help Net Security Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to scrutinize, modify, and adapt solutions according to their unique needs.

React to this headline:

Loading spinner

15 open-source cybersecurity tools you’ll wish you’d known earlier Read More »

The dynamic relationship between AI and application development

The dynamic relationship between AI and application development 2024-01-04 at 06:31 By Help Net Security In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way applications are developed and redefining the possibilities within the tech industry. The post The dynamic relationship between AI

React to this headline:

Loading spinner

The dynamic relationship between AI and application development Read More »

Consumers prepared to ditch brands after cybersecurity issues

Consumers prepared to ditch brands after cybersecurity issues 2024-01-04 at 06:01 By Help Net Security In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research found that consumers hold nuanced perceptions regarding cybersecurity incidents and are often less

React to this headline:

Loading spinner

Consumers prepared to ditch brands after cybersecurity issues Read More »

Scroll to Top