Source: www.infosecurity-magazine.com – Author: 1 Cybersecurity firm Eclypsium has uncovered a potential backdoor in Gigabyte systems, raising concerns about the security of the technology supply chain....
Day: June 2, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Phil Muncaster As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements...
ISACA pledges to help grow cybersecurity workforce in Europe – Source: www.csoonline.com
Source: www.csoonline.com – Author: ISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations. IT Stone...
BigID wants to let you tweak your data classifications manually – Source: www.csoonline.com
Source: www.csoonline.com – Author: Sailing the seas of enterprise data may get easier, with BigID’s latest release. The company hopes to make discovery simpler by letting...
What is the Cybercrime Atlas? How it can help disrupt cybercrime – Source: www.csoonline.com
Source: www.csoonline.com – Author: The Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting...
New Horabot campaign takes over victim’s Gmail, Outlook accounts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A previously unknown campaign involving the Hotabot botnet malware has targeted Spanish-speaking users in Latin America since at least November...
Windows 11 will let you view phone photos in File Explorer – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is now rolling out a new Windows 11 dev build allowing Insiders to view their phone’s camera roll in...
Harvard Pilgrim Health Care ransomware attack hits 2.5 million people – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Harvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with...
Russia says US hacked thousands of iPhones in iOS zero-click attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Russian cybersecurity firm Kaspersky says some iPhones on its network were hacked using an iOS vulnerability that installed malware via...
Google triples rewards for Chrome sandbox escape chain exploits – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google announced today that bug bounty hunters who report sandbox escape chain exploits targeting its Chrome web browser are now...
New MOVEit Transfer zero-day mass-exploited in data theft attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit...
Russia Blames US Intelligence for iOS Zero-Click Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Russian anti-malware vendor Kaspersky on Thursday said it discovered an APT actor launching zero-click iMessage exploits on iOS-powered devices in...
Toyota Discloses New Data Breach Involving Vehicle, Customer Information – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Japanese car maker Toyota this week announced that cloud configuration issues have led to years-long exposure of customer data. The...
Cisco Acquiring Armorblox for Predictive and Generative AI Technology – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...
Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Organizations using Moxa’s MXsecurity product have been informed about two potentially serious vulnerabilities that could be exploited by malicious hackers...
Amazon Settles Ring Customer Spying Complaint – Source: www.securityweek.com
Source: www.securityweek.com – Author: AFP Amazon on Wednesday agreed to pay $30.8 million to settle Ring and Alexa privacy complaints filed by US regulators, including accusations...
Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Some organizations can expose sensitive personal and corporate information by failing to properly deactivate Salesforce Community websites that are no...
Adobe Inviting Researchers to Private Bug Bounty Program – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Adobe on Wednesday called out for all researchers on the HackerOne vulnerability reporting platform to join its VIP private bug...
Critical Vulnerabilities Found in Faronics Education Software – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Vulnerabilities identified in the Faronics Insight education software could lead to various types of attacks, including unauthenticated remote code execution...
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 01, 2023Ravie LakshmananCyber Threat / Network Security An analysis of the “evasive and tenacious” malware known as QBot has revealed...
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 01, 2023Ravie LakshmananMobile Security / APT A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of...
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 01, 2023Ravie LakshmananCybercrime / Malware Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to...