Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Day: December 6, 2024
Ethyca Raises $10 Million for Data Privacy Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Data privacy and AI governance platform provider Ethyca on Thursday announced raising $10 million in a funding round that brings...
SonicWall Patches 6 Vulnerabilities in Secure Access Gateway – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire SonicWall this week announced patches for multiple vulnerabilities in the SMA100 SSL-VPN secure access gateway, including high-severity flaws leading to...
Atrium Health Data Breach Impacts 585,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Healthcare company Atrium Health has notified the US Department of Health and Human Services (HHS) that a recently discovered data...
Google Open Sources Security Patch Validation Tool for Android – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google on Thursday announced open sourcing a patch validation tool to help Android platform developers scan their code for missing...
PoC Exploit Published for Unpatched Mitel MiCollab Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Attack surface management firm WatchTowr on Thursday warned of an unpatched vulnerability in the Mitel MiCollab enterprise collaboration platform allowing...
Recently Charged Scattered Spider Suspect Did Poor Job at Covering Tracks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A 19-year-old from California has been charged over his alleged role in Scattered Spider attacks, and court documents show that...
Critical Vulnerability Discovered in SailPoint IdentityIQ – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire SailPoint this week warned that a critical-severity vulnerability in the identity and access management (IAM) platform IdentityIQ could allow attackers...
A Technical Look at the New ‘Termite’ Ransomware that Hit Blue Yonder – Source:cyble.com
Source: cyble.com – Author: Paul Shread. The ransomware attack that hit supply chain management platform Blue Yonder and its customers last month was the work of...
Harnessing the Working Genius for Team Success – Source:www.hackerone.com
Source: www.hackerone.com – Author: Debbie Cotton. Recognizing team members’ unique strengths and abilities is crucial for achieving optimal performance. Employees at HackerOne utilize the Working Genius model,...
Facing sale or ban, TikTok tossed under national security bus by appeals court – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn A US federal appeals court has rejected a challenge to the law that prevents popular apps that collect data on...
Salt Typhoon forces FCC’s hand on making telcos secure their networks – Source: go.theregister.com
Source: go.theregister.com – Author: Dan Robinson The head of America’s Federal Communications Commission (FCC) wants to force telecoms operators to tighten network security in the wake...
Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A Russian programmer defied the Federal Security Service (FSB) by publicizing the fact his phone was infected with spyware after...
Protect your clouds – Source: go.theregister.com
Source: go.theregister.com – Author: David Gordon Sponsored Post According to the 2024 IBM Cost of the Data Breach Report 40 percent of data breaches identified between...
PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons updated A zero-day arbitrary file read vulnerability in Mitel MiCollab can be chained with a now-patched critical bug in the...
Microsoft: Another Chinese cyberspy crew targeting US critical orgs ‘as of yesterday’ – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A Chinese government-linked group that Microsoft tracks as Storm-2077 has been actively targeting critical organizations and US government agencies as...
Exploits and vulnerabilities in Q3 2024 – Source: securelist.com
Source: securelist.com – Author: Alexander Kolesnikov Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that are not standard for cyberattacks. This is because...
Cryptohack Roundup: Solana npm Package Attack’s Wallet Risks – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime Also, Man Who Stole $3.5M of Cloud Computing to Mine $1M...
CEO’s Murder Sparks Outcry Over UHC’s Coverage Denials – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Artificial Intelligence & Machine Learning , Healthcare , Industry Specific Shell Casing Inscription ‘Deny’ Points to Potential Motive in CEO’s Killing Marianne...
Veeam Closes $2B Offering to Boost Data Resilience, Eyes IPO – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Business Continuity Management / Disaster Recovery , Governance & Risk Management CEO Anand Eswaran Talks Investors, Innovation and Data Resilience Leadership Michael...
Russian Forces Accused of Secretly Planting Spyware on Phone – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime Russian Activist for Ukraine Claims Spyware Was Installed While in...
Live Webinar | Cyber Incident Response: Recovery and Review – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Presented by Veeam 60 Minutes Safeguarding your data and ensuring organizational resilience requires a proactive approach in incident...
Webinar | The State of Observability in Financial Services – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Next-Generation Technologies & Secure Development , Observability Presented by Splunk 60 minutes Observability isn’t the new kid on...
How Hackers Can Manipulate AI to Affect Health App Accuracy – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Hackers can potentially use AI to manipulate data that’s generated and shared by some health apps, diminishing the data’s accuracy and integrity,...
How to Take the Complexity Out of Cybersecurity – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: It goes without saying: Business ecosystems are increasingly complex, and so are the cybersecurity systems and strategies deployed to protect them. But...
Why SOC Roles Need to Evolve to Attract a New Generation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jessica Belt Source: Dragos Condrea via Alamy Stock Photo COMMENTARY When I began my career, the security operations center (SOC) analyst role...
Open Source Security Priorities Get a Reshuffle – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Photon Photo via Shutterstock Open source components aimed at connecting applications to cloud resources and those written...
U.S. CISA adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 06, 2024 U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog....
Hundred of CISCO switches impacted by bootloader flaw – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 06, 2024 A bootloader vulnerability in Cisco NX-OS affects 100+ switches, allowing attackers to bypass image signature...
Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 05, 2024 SOC analysts, vital to cybersecurity, face burnout due to exhausting workloads, risking their well-being and...