Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Imaginechina Limited via Alamy Stock Photo Since 2018, a previously unknown Chinese threat actor has been using...
Month: January 2024
Microsoft Shares New Guidance in Wake of ‘Midnight Blizzard’ Cyberattack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: dennizn via Shutterstock Microsoft has released new guidance for organizations on how to protect against persistent nation-state...
Series of Cyberattacks Hit Ukrainian Critical Infrastructure Organizations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: Andrii Dragan via Alamy Stock Photo Several Ukrainian critical infrastructure entities — including the country’s largest state-owned oil...
Saudi Arabia Boosts Railway Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Leyden, Contributing Writer Source: CelCinar via Alamy Stock Photo The Saudi Railway Company (SAR) has announced a partnership with “sirar by...
Redefining Cybersecurity for a Comprehensive Security Posture – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ayan Halder Source: Andriy Popov via Alamy Stock Photo Cybersecurity is the practice of securing businesses’ infrastructure and endpoints from unauthorized access....
ICS Ransomware Danger Rages Despite Fewer Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading Source: Sergey Ryzhov via Alamy Stock Photo Despite takedowns of top ransomware groups, those remaining threat actors...
Pegasus Spyware Targets Togolese Journalists’ Mobile Devices – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: Mario Martija Sevilla via Alamy Stock Photo Cyberattackers have installed the Pegasus spyware on the phones of multiple...
Who is Alleged Medibank Hacker Aleksandr Ermakov? – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of...
Microsoft releases first Windows Server 2025 preview build – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has released Windows Server Insider Preview 26040, the first Windows Server 2025 build for admins enrolled in its Windows...
Microsoft introduces flighting for Windows Server insiders – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has launched flighting for Windows Server systems enrolled in its Windows Insider open software testing program. Starting today, admins...
Microsoft Teams outage causes connection issues, message delays – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is investigating an ongoing and widespread outage impacting the users of its Teams communication platform and causing connectivity issues,...
Ukraine: Hack wiped 2 petabytes of data from Russian research center – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Main Intelligence Directorate of Ukraine’s Ministry of Defense claims that pro-Ukrainian hacktivists breached the Russian Center for Space Hydrometeorology,...
Microsoft reveals how hackers breached its Exchange Online accounts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Microsoft confirmed that the Russian Foreign Intelligence Service hacking group, which hacked into its executives’ email accounts in November 2023,...
Role of Wazuh in building a robust cybersecurity architecture – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Wazuh Cybersecurity architecture refers to the design and framework governing an organization’s approach to securing information systems. It outlines the...
Pwn2Own Automotive: $1.3M for 49 zero-days, Tesla hacked twice – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The first edition of Pwn2Own Automotive has ended with competitors earning $1,323,750 for hacking Tesla twice and demoing 49 zero-day...
Perfecting the Defense-in-Depth Strategy with Automation – Source:thehackernews.com
Source: thehackernews.com – Author: . Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this...
Chatbots and Human Conversation – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier For most of history, communicating with a computer has not been like communicating with a person. In their earliest years,...
Ukraine Arrests Hacker for Assisting Russian Missile Strikes – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Ukrainian security services have arrested a hacker for allegedly targeting government websites and providing intelligence to Russia to carry out missile...
New Leaks Expose Web of Iranian Intelligence and Cyber Companies – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 New evidence shows that Iran’s intelligence and military services are associated with cyber activities targeting Western countries through their network of...
Data Privacy Week: Companies are Banning Generative AI Due to Privacy Risks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 More than a quarter (27%) of organizations have banned the use of generative AI among their workforce over privacy and data...
Russian Midnight Blizzard APT is targeting orgs worldwide, Microsoft warns – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Russian Midnight Blizzard APT is targeting orgs worldwide, Microsoft warns Microsoft revealed that Russia-linked APT Midnight Blizzard has been targeting...
Watch out, experts warn of a critical flaw in Jenkins – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Watch out, experts warn of a critical flaw in Jenkins Jenkins maintainers addressed several security vulnerabilities, including a critical remote...
Pwn2Own Automotive 2024 Day 2 – Tesla hacked again – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pwn2Own Automotive 2024 Day 2 – Tesla hacked again Researchers hacked the Tesla infotainment system and found 24 zero-days on...
Yearly Intel Trend Review: The 2023 RedSense report – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Yearly Intel Trend Review: The 2023 RedSense report The 2023 RedSense report covers long-term observations we have made regarding intel...
Cisco warns of a critical bug in Unified Communications products, patch it now! – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cisco warns of a critical bug in Unified Communications products, patch it now! Cisco addressed a critical flaw in its...
Malicious Ads on Google Target Chinese Users with Fake Messaging Apps – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 26, 2024NewsroomMalvertising / Phishing-as-a-service Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as...
Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 26, 2024NewsroomThreat Intelligence / Cyber Attack Microsoft on Thursday said the Russian state-sponsored threat actors responsible for a cyber attack...
Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 26, 2024NewsroomCyber Crime / Malware 40-year-old Russian national Vladimir Dunaev has been sentenced to five years and four months in...
Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 26, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact...
$1.7 Billion Stolen in Cryptocurrency Hacks in 2023: Analysis – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs $1.7 billion were stolen last year as a result of 231 cryptocurrency platform hacks, according to a report from Chainalysis. ...