Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading The fast-rising Play ransomware group that targeted the City of Oakland earlier this year is now...
Day: August 20, 2023
How Innovation Accelerators Are at Work on the Dark Side – Source: www.darkreading.com
Source: www.darkreading.com – Author: Paul Fabara, Chief Risk Officer, Visa The digital revolution has given rise to incredible innovation in consumer experiences, but the same innovation...
Cyber Defenders Lead the AI Arms Race for Now – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Cyber defenders so far are winning the war over artificial intelligence: AI tools have yet to...
Citrix ADC, Gateways Still Backdoored, Even After Being Patched – Source: www.darkreading.com
Source: www.darkreading.com – Author: Edge Editors, Dark Reading Nearly 1,900 Citrix networking products around the world have been backdoored as part of a large-scale automated campaign...
8 AI Risk and Resilience Firms CISOs Should Track – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ericka Chickowski, Contributing Writer, Dark Reading Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered...
QR Code Phishing Campaign Targets Top US Energy Company – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading Attackers targeted a major US energy company with a phishing campaign that overall sent more than 1,000...
Iran and the Rise of Cyber-Enabled Influence Operations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Microsoft Security, Microsoft Iranian state actors have another weapon in their arsenal. Since June 2022, multiple Iranian state groups have deployed a...
Mandiant Releases Scanner to Identify Compromised NetScaler ADC, Gateway – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading With thousands of Citrix networking products vulnerable to a critical vulnerability still unpatched and exposed on the...
Google Chrome to warn when installed extensions are malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Google is testing a new feature in the Chrome browser that will warn users when an installed extension has been...
Cuba ransomware uses Veeam exploit against critical U.S. organizations – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT...
Hackers use VPN provider’s code certificate to sign malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The China-aligned APT (advanced persistent threat) group known as ‘Bronze Starlight’ was seen targeting the Southeast Asian gambling industry with...
Weekly Update 361 – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt This week hasd been manic! Non-stop tickets related to the new HIBP domain subscription service, scrambling to support invoicing and...
Evacuation of 30,000 hackers – Week in security with Tony Anscombe – Source:
Source: – Author: 1 DEF CON, the annual hacker’s convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the convention due to a...
DEF CON 31: US DoD urges hackers to go and hack ‘AI’ – Source:
Source: – Author: 1 The limits of current AI need to be tested before we can rely on their output Original Post URL: Category & Tags:...
Mass-spreading campaign targeting Zimbra users – Source:
Source: – Author: 1 ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server. Original Post URL: Category & Tags:...
DEF CON 31: Robot vacuums may be doing more than they claim – Source:
Source: – Author: 1 When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. Original Post URL:...
Black Hat 2023: Hacking the police (at least their radios) – Source:
Source: – Author: 1 Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure....
Black Hat 2023: How AI changes the monetization of search – Source:
Source: – Author: 1 Search engines, AI, and monetization in the new era Original Post URL: Category & Tags: – Views: 0
Black Hat 2023: AI gets big defender prize money – Source:
Source: – Author: 1 Black Hat is big on AI this year, and for a good reason Original Post URL: Category & Tags: – Views: 0
Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence – Source:
Source: – Author: 1 Current LLMs are just not mature enough for high-level tasks Original Post URL: Category & Tags: – Views: 0
20k security folks in the desert – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Unsurprisingly, artificial intelligence took the center stage at this year’s edition of Black Hat, one of the world’s largest gatherings of cybersecurity...
Black Hat 2023: Cyberwar fire-and-forget-me-not – Source:
Source: – Author: 1 What happens to cyberweapons after a cyberwar? Original Post URL: Category & Tags: – Views: 0
MoustachedBouncer: Espionage against foreign diplomats in Belarus – Source:
Source: – Author: 1 Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!...
Time is money, and online game scammers have lots of it – Source:
Source: – Author: 1 Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and...
Check cybersecurity pre-invest – Week in security with Tony Anscombe – Source:
Source: – Author: 1 When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules....
Fingerprints all over: Can browser fingerprinting increase website security? – Source:
Source: – Author: 1 Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?...
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap – Source:
Source: – Author: 1 With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some...
Foreign Intelligence Entities Eyeing US Space Agencies – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Standards, Regulations & Compliance China, Russia Are Leading Foreign Intelligence Threats...
App Security Posture Management Improves Software Security, Synopsys Says – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Jim Ivers and Natasha Gupta of Synopsys discuss customer challenges with application security. They talk about consolidation...
Cyderes Dives In On Working Safely With AI and Upping Your IAM Game – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading John Ayers and Mike Wyatt weigh in on how artificial intelligence has already been weaponized against businesses...