Source: go.theregister.com – Author: Jessica Lyons The outgoing boss of the FCC, Jessica Rosenworcel, has called on her colleagues to “quickly” adopt rules allowing the US...
Day: January 7, 2025
Turbulence at UN aviation agency as probe into potential data theft begins – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The United Nations’ aviation agency is investigating “a potential information security incident” after a cybercriminal claimed they had laid hands...
DEF CON’s hacker-in-chief faces fortune in medical bills after paralyzing neck injury – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Marc Rogers, DEF CON’s head of security, faces tens of thousands of dollars in medical bills following an accident that...
US adds web and gaming giant Tencent to list of Chinese military companies – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood The US Department of Defense has added Chinese messaging and gaming Tencent to its list of “Chinese military company”, a...
Sharing of Telegram User Data Surged After CEO Arrest – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Piotr Adamowicz via Alamy Stock Photo Before September 2024, policy of encrypted communications provider Telegram...
Pentagon Adds Chinese Gaming Giant Tencent to Federal Ban – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Cyberstock via Alamy Stock Photo NEWS BRIEF Chinese messaging and gaming giant Tencent has been...
CISA: Third-Party Data Breach Limited to Treasury Dept. – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: trekandshoot via Alamy Stock Photo NEWS BRIEF The US Cybersecurity and Infrastructure Security Agency (CISA)...
PhishWP Plug-in Hijacks WordPress E-Commerce Checkouts – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Primakov via Shutterstock A malicious plug-in found on a Russian cybercrime forum turns WordPress sites into phishing...
Name That Edge Toon: Greetings and Salutations – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Klossner Who are you? Who is the person behind the machine? Security involves asking people who they are all the time....
Cybercriminals Don’t Care About National Cyber Policy – Source: www.darkreading.com
Source: www.darkreading.com – Author: Christy Wyatt Christy Wyatt, President & Chief Executive Officer, Absolute Security January 7, 2025 3 Min Read Source: Albert Knapp via Alamy...
Veracode Buys Package Analysis Technology From Phylum – Source: www.darkreading.com
Source: www.darkreading.com – Author: Fahmida Y. Rashid Source: Yury Zap via Alamy Stock Photo NEWS BRIEF Application security company Veracode has acquired malicious package analysis, detection,...
New Research Highlights Vulnerabilities in MLOps Platforms – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Security researchers have identified multiple attack scenarios targeting MLOps platforms like Azure Machine Learning (Azure ML), BigML and Google Cloud Vertex AI,...
Moxa Urges Immediate Updates for Security Vulnerabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Moxa has identified two critical security vulnerabilities in its cellular routers, secure routers and network security appliances that could pose significant risks...
Phishing Click Rates Triple in 2024 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The rate at which enterprise users clicked on phishing lures nearly trebled in 2024, according to new research by Netskope. More than...
UK Government to Ban Creation of Explicit Deepfakes – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The British government has announced plans to criminalize the creation of sexually explicit deepfakes, with perpetrators facing up to two years behind...
CISA Claims Treasury Breach Did Not Impact Other Agencies – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A major US government data breach linked to Chinese threat actors was confined to the Treasury, a leading security agency has claimed....
Trolley Problem, Safety Versus Security of Generative AI – Source: www.securityweek.com
Source: www.securityweek.com – Author: Matt Honea Building on my previous column, I will dive into part deux, going deeper into the application of Generative AI and...
Former NSA Director Rob Joyce Joins DataTribe as Venture Partner – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News Former NSA director Rob Joyce has joined venture capital firm DataTribe as a venture partner to help identify and grow...
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The U.S. Defense Department has added dozens of Chinese companies, including games and technology company Tencent, artificial intelligence firm SenseTime...
Dell, HPE, MediaTek Patch Vulnerabilities in Their Products – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Hardware makers MediaTek, HPE and Dell on Monday released advisories to inform customers about potentially serious vulnerabilities found and patched...
Washington Attorney General Sues T-Mobile Over 2021 Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Washington State Attorney General Bob Ferguson on Monday filed a lawsuit against wireless carrier T-Mobile over a 2021 data breach....
CISA: No Federal Agency Beyond Treasury Impacted by BeyondTrust Incident – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US cybersecurity agency CISA on Monday said that no other federal agency beyond the Department of the Treasury was...
Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Roughly 2,000 ransomware attacks were launched over the past decade against critical infrastructure organizations in the United States and other...
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press China has slammed a decision by the U.S. Treasury to sanction a Beijing-based cybersecurity company for its alleged role in...
Gen AI is transforming the cyber threat landscape by democratizing vulnerability hunting – Source: www.csoonline.com
Source: www.csoonline.com – Author: Large language models (LLMs) are proving to be valuable tools for discovering zero-days, bypassing detection, and writing exploit code — thereby lowering...
US military allocated about $30 billion to spend on cybersecurity in 2025 – Source: www.csoonline.com
Source: www.csoonline.com – Author: The 2025 NDAA provides the US military with funding to rip Chinese gear out of telecom networks, protect mobile devices from foreign...
More telecom firms were breached by Chinese hackers than previously reported – Source: www.csoonline.com
Source: www.csoonline.com – Author: Salt Typhoon’s latest victims include Charter, Consolidated, and Windstream, underscoring the widening scope of China’s cyberespionage campaign against critical US infrastructure. Chinese...
Open source vulnerability scanner found with a serious vulnerability in its own code – Source: www.csoonline.com
Source: www.csoonline.com – Author: The flaw could allow attackers to bypass Nuclei’s template signature verification process to inject malicious codes into host systems. A widely popular...
In Appreciation: Amit Yoran, Tenable CEO, Passes Away – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Amit Yoran, Source: Tenable The cybersecurity industry reacted with shock at the loss of Amit Yoran, the renowned cybersecurity...
China’s Salt Typhoon Adds Charter, Windstream to Telecom Victim List – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Science Photo Library via Alamy Stock Photo NEWS BRIEF This past weekend, the Chinese state-backed...