Source: www.csoonline.com – Author: The cybersecurity and AI landscape continues to evolve at a breathtaking pace, and with it, the associated risks. The cybersecurity and AI...
Day: January 10, 2025
Software-Lücke bei KigaRoo: Millionen Kita-Daten offen im Netz – Source: www.csoonline.com
Source: www.csoonline.com – Author: Aufgrund einer Schwachstelle in der Software KigaRoo standen mehr als zwei Millionen Kita-Daten offen im Netz. Die Lücke wurde inzwischen geschlossen. Die...
Malware targets Mac users by using Apple’s security tool – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 10 Jan 20253 mins EncryptionMalwarePhishing Using Apple’s proprietary string encryption, the malware evaded detection for months. A variant of the Banshee...
SEC rule confusion continues to put CISOs in a bind a year after a major revision – Source: www.csoonline.com
Source: www.csoonline.com – Author: Feature 10 Jan 20256 mins Business IT AlignmentCSO and CISORegulation Despite a spate of recent actions exemplifying how the US Securities and...
6 Risk-Assessment-Frameworks im Vergleich – Source: www.csoonline.com
Source: www.csoonline.com – Author: IT-Risiken “so Pi mal Daumen” zu bewerten, kann ins Auge gehen. Mit diesen sechs Frameworks fahren Sie besser. Mit dem richtigen Framework...
China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Lobro via Alamy Stock Photo A Chinese threat actor is once again exploiting Ivanti remote access devices...
Fake CrowdStrike ‘Job Interviews’ Become Latest Hacker Tactic – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: ImageBroker.com GmbH & Co. KG via Alamy Stock Photo NEWS BRIEF Cybercriminals have picked up...
Russia Carves Out Commercial Surveillance Success Globally – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Golden Dayz via Shutterstock A half-dozen governments in Central Asia and Latin American have purchased the System...
The Path Toward Championing Diversity in Cybersecurity Education – Source: www.darkreading.com
Source: www.darkreading.com – Author: Laurie Salvail Source: Aleksei Gorodenkov via Alamy Stock Photo COMMENTARY As we enter 2025 and face an new presidential administration, the United...
Australian IT Sector Maintains Strong Employment Outlook for 2025 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Ben Abbott The IT sector remains a bright spot in the Australian job market heading into 2025, boasting the most positive employment...
What’s Next for Open Source Software Security in 2025? – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse Open-source software is common throughout the tech world, and tools like software composition analysis can spot dependencies and secure them....
Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Cybercriminals are impersonating CrowdStrike recruiters to distribute a cryptominer on victim devices. CrowdStrike said it identified phishing campaign exploiting its...
Slovakia Hit by Historic Cyber-Attack on Land Registry – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A large-scale cyber-attack originating from outside Slovakia’s borders has hit the information system of the Office of Geodesy, Cartography and Cadastre of...
Medusind Breach Exposes Sensitive Patient Data – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: US dental and medical billing firm Medusind is notifying over 360,000 customers that their personal, financial and medical data may have been...
Fake PoC Exploit Targets Security Researchers with Infostealer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors have created a fake proof-of-concept (PoC) exploit for a critical Microsoft vulnerability, designed to lure security researchers into downloading and...
Drug addiction treatment service admits attackers stole sensitive patient data – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones BayMark Health Services, one of the biggest drug addiction treatment facilities in the US, says it is notifying some patients...
Devs sent into security panic by ‘feature that was helpful … until it wasn’t’ – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood On Call Velkomin, Vælkomin, Hoş geldin, and welcome to Friday, and therefore to another edition of On Call – The...
Look for the label: White House rolls out ‘Cyber Trust Mark’ for smart devices – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn The White House this week introduced a voluntary cybersecurity labeling program for technology products so that consumers can have some...
Proofpoint Named a Leader in 2024 Gartner Magic Quadrant for Digital Communications Governance and Archiving Solutions – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Proofpoint evaluation as a Leader based on Completeness of Vision and Ability to Execute SUNNYVALE, Calif., January 9, 2025 – Proofpoint, Inc., a...
Canadian man loses a cryptocurrency fortune to scammers – here’s how you can stop it happening to you – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A man from Toronto has described to the media how he lost $100,000 worth of cryptocurrency investment after making an...
Smashing Security podcast #399: Honey in hot water, and reset your devices – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content Ever wonder how those “free” browser extensions that promise to save you money actually work? We dive...
Space Bears ransomware: what you need to know – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley What is Space Bears? Space Bear is a relatively new ransomware group that first appeared on the radar in April...
In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to Silk Typhoon – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Banshee macOS Malware Expands Targeting – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Banshee macOS information stealer has been updated to expand its target list to systems using the Russian language, cybersecurity...
Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Healthcare and substance abuse treatment provider BayMark Health Services has started notifying patients that their personal information was stolen in...
PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A new phishing campaign relies on legitimate links to trick victims into logging in and giving attackers control of their...
Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A research project targeting vulnerabilities in widely used content access and protection technology from Microsoft raises some questions over certain...
Hursti hacks, DEF CON villages, and the Dubious state of electronic voting – Source:www.hackerone.com
Source: www.hackerone.com – Author: luke. Harri Hursti is one of the most knowledgeable hackers of election technology. He’s most known for the eponymous hack in 2005...
Zero-Day Vulnerability in Ivanti VPN – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Aaron • January 9, 2025 3:11 PM What does it say about the current philosophies of the corporate...
Fortifying The Links – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team In today’s hyper-connected world, supply chains are the lifeblood of industries, spanning across continents and involving numerous third-party vendors. While...