Uncategorized

Cumbrian cops accidentally publish all of its officers’ details online

Cumbrian cops accidentally publish all of its officers’ details online 14/08/2023 at 14:48 By Dan Robinson Names, job titles and salaries included in unwitting leak Cumbria Constabulary inadvertently published the names and salaries of all its officers and staff online earlier this year, making it the second UK force in a fortnight to admit disclosing […]

React to this headline:

Loading spinner

Cumbrian cops accidentally publish all of its officers’ details online Read More »

Identity Threat Detection and Response: Rips in Your Identity Fabric

Identity Threat Detection and Response: Rips in Your Identity Fabric 14/08/2023 at 14:47 By Why SaaS Security Is a Challenge In today’s digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive their operations. However, this widespread adoption has also opened the doors to new security risks and vulnerabilities. The SaaS security attack

React to this headline:

Loading spinner

Identity Threat Detection and Response: Rips in Your Identity Fabric Read More »

Charming Kitten Targets Iranian Dissidents with Advanced Cyber Attacks

Charming Kitten Targets Iranian Dissidents with Advanced Cyber Attacks 14/08/2023 at 14:47 By Germany’s Federal Office for the Protection of the Constitution (BfV) has warned of cyber attacks targeting Iranian persons and organizations in the country since the end of 2022. “The cyber attacks were mainly directed against dissident organizations and individuals – such as

React to this headline:

Loading spinner

Charming Kitten Targets Iranian Dissidents with Advanced Cyber Attacks Read More »

New Financial Malware ‘JanelaRAT’ Targets Latin American Users

New Financial Malware ‘JanelaRAT’ Targets Latin American Users 14/08/2023 at 14:01 By Users in Latin America (LATAM) are the target of a financial malware called JanelaRAT that’s capable of capturing sensitive information from compromised Microsoft Windows systems. “JanelaRAT mainly targets financial and cryptocurrency data from LATAM bank and financial institutions,” Zscaler ThreatLabz researchers Gaetano Pellegrino and Sudeep

React to this headline:

Loading spinner

New Financial Malware ‘JanelaRAT’ Targets Latin American Users Read More »

Oracle, SUSE and others caught up in RHEL drama hit back with OpenELA

Oracle, SUSE and others caught up in RHEL drama hit back with OpenELA 14/08/2023 at 13:17 By Liam Proven ‘No subscriptions. No passwords. No barriers. Freeloaders welcome’ A non-profit called the Open Enterprise Linux Association (OpenELA) has been formed by Oracle, SUSE, CIQ, and other organizations that make Red Hat Enterprise Linux (RHEL) and CentOS

React to this headline:

Loading spinner

Oracle, SUSE and others caught up in RHEL drama hit back with OpenELA Read More »

Indian armed forces gives Windows its marching orders, but only for desktop warriors

Indian armed forces gives Windows its marching orders, but only for desktop warriors 14/08/2023 at 11:47 By Rupert Goodwins I am become Tux, destroyer of warez Opinion  Indian mythology is rich beyond measure in tales of gods, demons, and humans doing battle. Deception, alliances, betrayal, supernatural weaponry, and devastating consequences tangle with morality and greed.

React to this headline:

Loading spinner

Indian armed forces gives Windows its marching orders, but only for desktop warriors Read More »

If you’re Russian to the Moon, expect traffic: Moscow’s Putin a lander into orbit

If you’re Russian to the Moon, expect traffic: Moscow’s Putin a lander into orbit 14/08/2023 at 09:47 By Simon Sharwood India’s close to landing one, too, and Japan is counting down to a launch If you’re thinking of taking a trip to the Moon in the next few weeks, check the traffic report before you

React to this headline:

Loading spinner

If you’re Russian to the Moon, expect traffic: Moscow’s Putin a lander into orbit Read More »

Hactivitsts attack Japanese government over Fukushima wastewater release

Hactivitsts attack Japanese government over Fukushima wastewater release 14/08/2023 at 09:02 By Laura Dobberstein Claiming affiliation with Anonymous, hackers want more public debate over radioactive water release plans Entities using the name and iconography of Anonymous (EUTNAIOA) claim to have conducted cyberprotests against the Japanese government for actions related to the release of wastewater from

React to this headline:

Loading spinner

Hactivitsts attack Japanese government over Fukushima wastewater release Read More »

India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users’ Privacy First

India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users’ Privacy First 14/08/2023 at 08:46 By The Indian President Droupadi Murmu on Friday granted assent to the Digital Personal Data Protection Bill (DPDPB) after it was unanimously passed by both houses of the parliament last week, marking a significant step towards securing people’s information.

React to this headline:

Loading spinner

India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users’ Privacy First Read More »

Honey, can you shrink the plugin? Mozilla allows desktop extensions on Firefox for Android

Honey, can you shrink the plugin? Mozilla allows desktop extensions on Firefox for Android 14/08/2023 at 07:47 By Simon Sharwood Browser has added multi-process support Mozilla has teased an upcoming plan to allow plugins developed for its desktop browser to run on its Android app.… This article is an excerpt from The Register View Original

React to this headline:

Loading spinner

Honey, can you shrink the plugin? Mozilla allows desktop extensions on Firefox for Android Read More »

US government to investigate China’s Microsoft email breach

US government to investigate China’s Microsoft email breach 14/08/2023 at 06:02 By Brandon Vigliarolo PLUS: Phishing campaign targets the C-suite; Cybercrime arrests in EU and Africa; and more Infosec in brief  The July breach of Microsoft Exchange Online by suspected Chinese hackers is the next topic up for review by the Department of Homeland Security’s

React to this headline:

Loading spinner

US government to investigate China’s Microsoft email breach Read More »

Multiple Flaws in CyberPower and Dataprobe Products Put Data Centers at Risk

Multiple Flaws in CyberPower and Dataprobe Products Put Data Centers at Risk 13/08/2023 at 00:48 By Multiple security vulnerabilities impacting CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s iBoot Power Distribution Unit (PDU) could be potentially exploited to gain unauthenticated access to these systems and inflict catastrophic damage in target environments. The

React to this headline:

Loading spinner

Multiple Flaws in CyberPower and Dataprobe Products Put Data Centers at Risk Read More »

Let’s play… Turn off the power to datacenter boxen

Let’s play… Turn off the power to datacenter boxen 13/08/2023 at 00:02 By Jessica Lyons Hardcastle Trellix bods say it’s not that hard to do, thanks to these vulnerabilities DEF CON  It would be relatively easy for miscreants to break into critical datacenter power management gear, shut off electricity supplies to multiple connected devices, and

React to this headline:

Loading spinner

Let’s play… Turn off the power to datacenter boxen Read More »

Inside the Black Hat network operations center, volunteers work in geek heaven

Inside the Black Hat network operations center, volunteers work in geek heaven 12/08/2023 at 16:31 By Iain Thomson NOC, NOC … Who’s there? Black Hat  Every summer, pandemics permitting, a group of volunteers gather in a Las Vegas hotel to run one of the more unusual examples of IT infrastructure on the planet: the Black

React to this headline:

Loading spinner

Inside the Black Hat network operations center, volunteers work in geek heaven Read More »

Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping

Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping 12/08/2023 at 15:01 By Multiple security vulnerabilities have been disclosed in AudioCodes desk phones and Zoom’s Zero Touch Provisioning (ZTP) that could be potentially exploited by a malicious attacker to conduct remote attacks. “An external attacker who leverages the vulnerabilities discovered in AudioCodes Ltd.’s

React to this headline:

Loading spinner

Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping Read More »

Google Chrome to shield encryption keys from promised quantum computers

Google Chrome to shield encryption keys from promised quantum computers 12/08/2023 at 13:36 By Thomas Claburn QC crypto-cracking coming in 5, 10, maybe 50 years, so act … now? Google has started deploying a hybrid key encapsulation mechanism (KEM) to protect the sharing of symmetric encryption secrets during the establishment of secure TLS network connections.…

React to this headline:

Loading spinner

Google Chrome to shield encryption keys from promised quantum computers Read More »

Curiosity finds evidence of wet and dry seasons on ancient Mars

Curiosity finds evidence of wet and dry seasons on ancient Mars 12/08/2023 at 11:16 By Brandon Vigliarolo Scientists: Martian mud cracked in a manner that only happens after repeated cycles of drying The Mars Curiosity rover continues to make discoveries that shed light on the early days of the Red Planet, this time having found

React to this headline:

Loading spinner

Curiosity finds evidence of wet and dry seasons on ancient Mars Read More »

Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested

Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested 12/08/2023 at 10:31 By European and U.S. law enforcement agencies have announced the dismantling of a bulletproof hosting service provider called Lolek Hosted, which cybercriminals have used to launch cyber-attacks across the globe. “Five of its administrators were arrested, and all of its servers seized, rendering LolekHosted.net

React to this headline:

Loading spinner

Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested Read More »

New Python URL Parsing Flaw Enables Command Injection Attacks

New Python URL Parsing Flaw Enables Command Injection Attacks 12/08/2023 at 09:45 By A high-severity security flaw has been disclosed in the Python URL parsing function that could be exploited to bypass domain or protocol filtering methods implemented with a blocklist, ultimately resulting in arbitrary file reads and command execution. “urlparse has a parsing problem

React to this headline:

Loading spinner

New Python URL Parsing Flaw Enables Command Injection Attacks Read More »

Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy

Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy 12/08/2023 at 03:18 By Iain Thomson ‘It’s like Tor and IPFS had sex and produced this thing’ DEF CON  Infosec super-band the Cult of the Dead Cow has released Veilid (pronounced vay-lid), an open source project applications can use to connect up

React to this headline:

Loading spinner

Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy Read More »

Scroll to Top