Source: go.theregister.com – Author: Simon Sharwood The Internet Archive had a bad day on the infosec front, after being DDoSed and having had its user account...
Day: October 13, 2024
Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A cyberespionage APT crew named GoldenJackal hacked air-gapped PCs belonging to government and diplomatic entities at least twice using two...
Smart TVs are spying on everyone – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Smart TVs are watching their viewers and harvesting their data to benefit brokers using the same ad technology that denies...
Marriott settles for a piddly $52M after series of breaches affecting millions – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Marriott has agreed to pay a $52 million penalty and develop a comprehensive infosec program following a series of major...
National Public Data files for bankruptcy, admits ‘hundreds of millions’ potentially affected – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson The Florida business behind data brokerage National Public Data has filed for bankruptcy, admitting “hundreds of millions” of people were...
Trailblazing Women in Steel: Meet Nucor’s Industry Leaders
Get to know three women who are shaping the future of innovation, technology, and sustainability at Nucor. Views: 1
Meet Tricia Drake, Entrepreneurs Affinity Group Lead
As part of the Entrepreneurs AG’s spotlight month, learn more about Tricia Drake, the FY25 Entrepreneurs AG Lead and the Founder/Principal of HVAC Double Check LLC....
An Autistic Woman’s Guide to Asking for Help: Self-advocacy in the Workplace When Living With a Non-visible Disability
As part of the DisAbility Affinity Group’s spotlight month, Trisha Matthews, the AG’s professional development chair, reflects on her experience advocating for herself as a woman...
Celebrate SWE Outreach: 2023-2024 In Review
Read the fifth issue of “Celebrate SWE Outreach” to learn about the accomplishments of SWE volunteers over the past year who are inspiring the next generation...
SWE Community Spotlight: SWE Entrepreneurs Affinity Group
Each month throughout the year, we spotlight a different SWE Affinity Group. Learn more about the mission, upcoming events, and how to get involved with the...
SWE’s DisAbility Inclusion AG Celebrates National Disability Employment Awareness Month
Learn more about NDEAM, its impact, and ways you can be an ally as part of the DisAbility Inclusion AG’s spotlight month. Views: 0
Danaher’s Women in STEM on the Rise
Meet three remarkable Danaher engineers who are excelling in their fields and paving the way for future generations of women in STEM. Views: 0
Chemical Engineering Activity: Let’s Make Ice Cream!
Chemical engineering is cool, but it’s even cooler when making ice cream! Views: 0
Congratulations to the 2024-2025 SWE Scholarship Recipients!
SWE is proud to award 328 scholarships, totaling nearly $1.5 million, to undergraduate and graduate engineering students for the 2024-2025 academic year. This year marks a...
SWE Diverse Podcast Ep 281: Engineered by Women With Catherine Hunt Ryan of Bechtel
Catherine Hunt Ryan, president of Bechtel’s Manufacturing and Technology business, previews her WE24 keynote and discusses the pivotal role women play in infrastructure projects in this...
Awaken Likho is awake: new techniques of an APT group – Source: securelist.com
Source: securelist.com – Author: Kaspersky Introduction In July 2021, a campaign was launched primarily targeting Russian government agencies and industrial enterprises. Shortly after the campaign started,...
Scam Information and Event Management – Source: securelist.com
Source: securelist.com – Author: Alexander Kryazhev, Denis Sitchikhin While trying to deliver malware on victims’ devices and stay on them as long as they can, sometimes...
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research – Source: securelist.com
Source: securelist.com – Author: Mohamad Amin Hasbini Introduction In the ever-evolving landscape of cybersecurity, logs, that is information collected from various sources like network devices, endpoints,...
Key Group: another ransomware group using leaked builders – Source: securelist.com
Source: securelist.com – Author: Kaspersky Key Group, or keygroup777, is a financially motivated ransomware group primarily targeting Russian users. The group is known for negotiating with...
Threat landscape for industrial automation systems, Q2 2024 – Source: securelist.com
Source: securelist.com – Author: Kaspersky ICS CERT Statistics across all threats In the second quarter of 2024, the percentage of ICS computers on which malicious objects...
Hackers Prowling For Unencrypted BIG-IP Cookies, Warns CISA – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Attack Surface Management , Network Firewalls, Network Access Control , Network Performance Monitoring & Diagnostics Agency Says Cookies Could Help Attackers Find...
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups – Source: securelist.com
Source: securelist.com – Author: Kaspersky While analyzing attacks on Russian organizations, our team regularly encounters overlapping tactics, techniques, and procedures (TTPs) among different cybercrime groups, and...
Web tracking report: who monitored users’ online activities in 2023–2024 the most – Source: securelist.com
Source: securelist.com – Author: Anna Larkina, Flavio Negrini Web tracking has become a pervasive aspect of our online experience. Whether we’re browsing social media, playing video...
Rhysida Leaks Nursing Home Data, Demands $1.5M From Axis – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Fraud Management & Cybercrime , Healthcare , Industry Specific Ransomware Gang Could Have Axis Health’s Mental Health, Drug Abuse Records Marianne Kolbasuk...
ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Video Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some...
How the Necro Trojan infiltrated Google Play, again – Source: securelist.com
Source: securelist.com – Author: Dmitry Kalinin Introduction We sometimes come across modified applications when analyzing suspicious files. These are created in response to user requests for...
Regulating AI Catastophic Risk Isn’t Easy – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Artificial Intelligence & Machine Learning , Legislation & Litigation , Next-Generation Technologies & Secure Development AI, Security Experts Discuss Who Defines the...
-=TWELVE=- is back – Source: securelist.com
Source: securelist.com – Author: Kaspersky In the spring of 2024, posts with real people’s personal data began appearing on the -=TWELVE=- Telegram channel. Soon it was...
Exotic SambaSpy is now dancing with Italian users – Source: securelist.com
Source: securelist.com – Author: GReAT Introduction In May 2024, we detected a campaign exclusively targeting victims in Italy. We were rather surprised by this, as cybercriminals...
Not Your Grandparent’s AI: New Age of Cybersecurity and IT Management – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Endpoint Detection & Response (EDR) , Next-Generation Technologies & Secure Development , Threat Detection Presented by Tanium 60 Minutes ...