Source: www.securityweek.com – Author: Eduard Kovacs Intel on Tuesday released a total of 46 new security advisories to inform customers about 80 vulnerabilities affecting the company’s...
Day: August 9, 2023
SAP Patches Critical Vulnerability in PowerDesigner Product – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs German software giant SAP has fixed more than a dozen new vulnerabilities with its August 2023 Patch Tuesday updates, including...
New ‘Inception’ Side-Channel Attack Targets AMD Processors – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Researchers on Tuesday disclosed the details of a new CPU side-channel attack named Inception that impacts AMD processors. The Inception...
40 Vulnerabilities Patched in Android With August 2023 Security Updates – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Just over 40 vulnerabilities have been patched by Google in the Android operating system with the release of the August...
Downfall: New Intel CPU Attack Exposing Sensitive Information – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The details of a new side-channel attack targeting Intel processors were disclosed on Tuesday. The attack, discovered by a researcher...
Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan – Source: www.securityweek.com
Source: www.securityweek.com – Author: Mike Lennon Rapid7 (NASDAQ: RPD) is the latest cybersecurity vendor to announce layoffs, with the Boston-based firm announcing a restructuring plan late...
Microsoft Visual Studio Code flaw lets extensions steal passwords – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Microsoft’s Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve...
Microsoft Office update breaks actively exploited RCE attack chain – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ionut Ilascu Microsoft today released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked...
Northern Ireland Police Officers Vulnerable After Data Leak – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A serious data leak has exposed the personal details of police officers and civilian personnel working at the Police Service of...
Notorious Phishing-as-a-Service Platform Shuttered – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A phishing-as-a-service (PaaS) platform which may have been responsible for over 150,000 phishing domains has been taken offline after an Interpol-led...
Summer Spending Pressure Fuels Loan Fee Fraud Fears – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The UK’s financial regulatory has warned consumers to be on the lookout for loan fee fraudsters after revealing new research claiming...
Microsoft Patches 80+ Flaws Including Two Zero-Days – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Microsoft released updates for 87 vulnerabilities yesterday, including two that are being actively exploited in the wild. The first zero-day was...
Tampa General Hospital Sued Over Data Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Law firm Morgan & Morgan has lodged a class-action lawsuit against Tampa General Hospital on behalf of three victims affected by...
ICO to investigate risk to police officers after Northern Ireland data breach – Source: www.theguardian.com
Source: www.theguardian.com – Author: Rory Carroll Ireland correspondent The UK’s Information Commissioner’s Office has launched an investigation into an unprecedented data breach that disclosed details of...
Electoral Commission and PSNI data breaches: what we know so far – Source: www.theguardian.com
Source: www.theguardian.com – Author: Dan Milmo Global technology editor The UK election watchdog and Northern Ireland’s police service both announced serious data breaches on Tuesday, in...
UK Electoral Commission Data Breach Exposes Information of 40 Million Voters – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The UK Electoral Commission revealed a cyberattack that exposed the personal data of all registered voters between 2014 and 2022....
Downfall Vulnerability Exposes Intel CPUs to Data and Encryption Keys Stealing – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Downfall vulnerability impacts various Intel microprocessors and enables encryption keys, passwords, and other sensitive data exfiltration. The flaw was dubbed...
Enhancing Cybersecurity with Remote Browser Isolation (RBI) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Popa In an age where the internet is vital for business, cyberattacks, malware, and phishing attempts have evolved to exploit vulnerabilities...
The FBI Is Investigating a Ransomware Attack that Disrupted Hospital Operations in 4 States – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici A large healthcare network operating across multiple states recently experienced widespread network disruptions due to a cyberattack, confirmed by the...
New Deep Learning Model Decodes Keyboard Sounds with 95% Accuracy – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici A team of researchers has introduced an innovative approach referred to as a “deep learning-based acoustic side-channel attack,” designed to...
Keep your sensitive data secure by using Encrypted Forms 2.0 from Jotform – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Graham Cluley Security News is sponsored this week by the folks at Jotform. Thanks to the great team there for...
Time is money, and online game scammers have lots of it – Source:
Source: – Author: 1 Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and...
Check cybersecurity pre-invest – Week in security with Tony Anscombe – Source:
Source: – Author: 1 When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules....
Fingerprints all over: Can browser fingerprinting increase website security? – Source:
Source: – Author: 1 Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?...
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap – Source:
Source: – Author: 1 With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some...
Quantum computing: Will it break crypto security within a few years? – Source:
Source: – Author: 1 Current cryptographic security methods watch out – quantum computing is coming for your lunch. Original Post URL: Category & Tags: – Views:...
Is backdoor access oppressive? – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK? Original...
Gathering dust and data: How robotic vacuums can spy on you – Source:
Source: – Author: 1 Mitigate the risk of data leaks with a careful review of the product and the proper settings. Original Post URL: Category &...
Dear all, What are some common subject lines in phishing emails? – Source:
Source: – Author: 1 Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. Original Post URL: Category & Tags: – Views:...
What happens if AI is wrong? – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for...