Source: www.darkreading.com – Author: Johanna Baum, CEO & Founder, Strategic Security Solutions (S3) End users get a bad rap with security — for good reason. As...
Month: June 2023
Apple Zero-Days, iMessage Used in 4-Year, Ongoing Spying Effort – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading For at least the past four years, an advanced persistent threat (APT) actor has been covertly...
Biometric Bypass: BrutePrint Makes Short Work of Fingerprint Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading Weaknesses in the biometric security architecture of Android phones could allow attackers to brute-force an encoded...
OpenAI Unveils Million-Dollar Cybersecurity Grant Program – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Artificial intelligence technology startup OpenAI has launched a $1 million cybersecurity grant program aimed at boosting defender-focused research and capabilities...
Galvanick Banks $10 Million for Industrial XDR Technology – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Galvanick, an early-stage startup working on an Extended Detection & Response (XDR) platform for industrial infrastructure, has scored $10 million...
Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Point32Health, the second-largest health insurer in Massachusetts, is in the process of informing more than 2.5 million individuals that their...
US, South Korea Detail North Korea’s Social Engineering Techniques – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The United States and South Korea on Thursday warned of North Korean social engineering attacks targeting the employees of think...
High-Severity Vulnerabilities Patched in Splunk Enterprise – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Splunk on Thursday announced Splunk Enterprise security updates that resolve multiple high-severity vulnerabilities, including some impacting third-party packages used by...
Idaho Hospitals Working to Resume Full Operations After Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press Two eastern Idaho hospitals and their clinics are working to resume full operations after a cyberattack on their computer systems....
Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Biotechnology company Enzo Biochem has revealed that the clinical test information of roughly 2.47 million individuals was exposed in a...
Apple Denies Helping US Government Hack Russian iPhones – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Apple has denied working with any government to add backdoors to its products after Russia accused the company of helping...
Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A zero-day vulnerability affecting Progress Software’s MOVEit Transfer product has been exploited to hack organizations and steal their data. Progress...
Google Temporarily Offering $180,000 for Full Chain Chrome Exploit – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google today announced significantly higher bug bounty rewards for vulnerability reports containing full chain exploits leading to a sandbox escape...
Microsoft is killing Cortana on Windows starting late 2023 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan After introducing a string of AI-powered assistants for its products, Microsoft has now announced that it will soon end support...
The Week in Ransomware – June 2nd 2023 – Whodunit? – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams It has been a fairly quiet week regarding ransomware, with only a few reports released and no new significant attacks....
Windows 11 to require SMB signing to prevent NTLM relay attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft says SMB signing (aka security signatures) will be required by default for all connections to defend against NTLM relay...
NSA and FBI: Kimsuky hackers pose as journalists to steal intel – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas State-sponsored North Korean hacker group Kimsuky (a.ka. APT43) has been impersonating journalists and academics for spear-phishing campaigns to collect intelligence from think...
Burton Snowboards discloses data breach after February attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Leading snowboard maker Burton Snowboards confirmed notified customers of a data breach after some of their sensitive information was “potentially”...
Malicious Chrome extensions with 75M installs removed from Web Store – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Google has removed from the Chrome Web Store 32 malicious extensions that could alter search results and push spam or...
Friday Squid Blogging: Squid Chromolithographs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
Open-Source LLMs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Open-Source LLMs In February, Meta released its large language model: LLaMA. Unlike OpenAI and its ChatGPT, Meta didn’t just give...
Mistrial in Criminal HIPAA Case Against Army Doctor & Spouse – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 HIPAA/HITECH , Standards, Regulations & Compliance Jury Deadlocked on Whether Couple Was Entrapped to Leak Records to Undercover Agent Marianne Kolbasuk...
Pentagon to Pay Starlink for Ukraine’s Satellite Broadband – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Risk Assessments Private Sector Services Remain Essential for Ukraine’s Defense as War Continues Mathew J. Schwartz...
Strengthen Cybersecurity with a Multi-Layered 3-2-1-0 Data Protection Strategy – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
SentinelOne Lays Off 5% of Staff as Data Consumption Tumbles – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Endpoint Protection Platforms (EPP) , Endpoint Security Stock Craters 36% as Execution Woes Contribute to SentinelOne Sales Projection Miss Michael Novinson...
ISMG Editors: Why Communications Skills Matter for CISOs – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Leadership & Executive Communication , Training & Security Leadership , Video Also: Health Entities Affected by Massive Data Breach; Identity Trends...
Ask Fitis, the Bear: Real Crooks Sign Their Malware – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of...
New QBot Malware Campaign Exploits WordPad for Infection – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici A recent QBot malware campaign has been observed leveraging a DLL hijacking vulnerability in the WordPad utility application to evade...
Ransomware Attack on Harvard Pilgrim Health Care Exposes 2.5M Patients Data – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici HPHC has revealed that in April 2023, a ransomware attack impacted 2,550,922 people and stole their sensitive data. This information...





























