That ticking noise is your end users’ laptopsGraham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there...
Month: February 2023
The cloud’s worst kept secret? Vulnerabilities
The cloud’s worst kept secret? VulnerabilitiesGraham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their...
“Ethical hacker” amongst those arrested in Dutch ransomware investigation
“Ethical hacker” amongst those arrested in Dutch ransomware investigationThree men have been arrested by Dutch police in connection with ransomware attacks that blackmailed thousands of companies....
ChatGPT Is Ingesting Corporate Secrets
ChatGPT Is Ingesting Corporate SecretsInteresting: According to internal Slack messages that were leaked to Insider, an Amazon lawyer told workers that they had “already seen instances”...
Defending against AI Lobbyists
Defending against AI LobbyistsWhen is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The...
Friday Squid Blogging: Thermal Batteries from Squid Proteins
Friday Squid Blogging: Thermal Batteries from Squid ProteinsResearchers are making thermal batteries from “a synthetic material that’s derived from squid ring teeth protein.” As usual, you...
Fines as a Security System
Fines as a Security SystemTile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make...
The Insecurity of Photo Cropping
The Insecurity of Photo CroppingThe Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for...
A Device to Turn Traffic Lights Green
A Device to Turn Traffic Lights GreenHere’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights...
Cyberwar Lessons from the War in Ukraine
Cyberwar Lessons from the War in UkraineThe Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the...
Putting Undetectable Backdoors in Machine Learning Models
Putting Undetectable Backdoors in Machine Learning ModelsThis is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to...
Friday Squid Blogging: Squid Processing Facility
Friday Squid Blogging: Squid Processing FacilityThis video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also...
Banning TikTok
Banning TikTokCongress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a...
McAfee 2023 Consumer Mobile Threat Report
McAfee 2023 Consumer Mobile Threat Report Smartphones put the proverbial world in the palm of your hand—you pay with it, play with it, keep in touch...
Microsoft fixes bug offering Windows 11 upgrades to unsupported PCs
Microsoft fixes bug offering Windows 11 upgrades to unsupported PCsMicrosoft has addressed a known issue behind unsupported computers being offered Windows 11 22H2 upgrades and being...
RIG Exploit Kit still infects enterprise users via Internet Explorer
RIG Exploit Kit still infects enterprise users via Internet ExplorerThe RIG Exploit Kit is undergoing its most successful period, attempting roughly 2,000 intrusions daily and succeeding...
ChatGPT is down worldwide – OpenAI working on issues
ChatGPT is down worldwide - OpenAI working on issuesChatGPT is down, according to OpenAI and users reports. Users are currently experiencing issues worldwide, with many unable...
Hacker leaks alleged Activision employee data on cybercrime forum
Hacker leaks alleged Activision employee data on cybercrime forumA threat actor has posted data the alleged data stolen from American game publisher Activision in December 2022...
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworks
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworksOf the numerous security frameworks available to help companies protect against...
Healthcare Most Hit by Ransomware Last Year, FBI Finds
Healthcare Most Hit by Ransomware Last Year, FBI FindsBureau Warns Underreporting Remains Rife, Including by Critical InfrastructureHealthcare last year was the most attacked sector within critical...
OnDemand Webinar: Stop Worrying About Your MDR Strategy
OnDemand Webinar: Stop Worrying About Your MDR StrategyRead MoreDataBreachToday.com RSS Syndication
Detectan troyano PlugX disfrazado de herramienta legítima de depuración de Windows
Detectan troyano PlugX disfrazado de herramienta legítima de depuración de WindowsSe ha observado que el troyano de acceso remoto PlugX se hace pasar por una herramienta...
Norway Seizes $5.84 Million in Cryptocurrency Stolen by Lazarus Hackers
Norway Seizes $5.84 Million in Cryptocurrency Stolen by Lazarus HackersNorwegian police agency Økokrim has announced the seizure of 60 million NOK (about $5.84 million) worth of...
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government AgenciesA spear-phishing campaign targeting Indian government entities aims to deploy an updated version of a backdoor called ReverseRAT....
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bug
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bugConditional code considered cryptographically counterproductive.Leer másNaked SecurityConditional code considered cryptographically counterproductive.
When Low-Tech Hacks Cause High-Impact Breaches
When Low-Tech Hacks Cause High-Impact BreachesWeb hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source...
Public Cloud Adoption is Accelerating in the MENA Region
Public Cloud Adoption is Accelerating in the MENA RegionPeoplActive is an ISO 27001:2013 certified leading tech hiring platform. By utilizing an exclusive network of 4000+ Silicon...
Palo Alto Networks Unfurls OT Security Service
Palo Alto Networks Unfurls OT Security Service At the Mobile World Congress event, Palo Alto Networks today launched a service for securing operation technology (OT) assets...
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworks
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworksOf the numerous security frameworks available to help companies protect against...
Security Updates – January 2023
Security Updates – January 2023Check out the latest security updates made to the GuardRails platform as of January 2023 per coding language: JavaScript, Java, C, Python,...




















