Source: www.securityweek.com – Author: Ionut Arghire A vulnerability in Subaru’s Starlink connected vehicle service provided unrestricted access to the accounts of customers in the US, Canada,...
Day: January 24, 2025
North Korean Fake IT Workers More Aggressively Extorting Enterprises – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The individuals involved in North Korean fake IT worker schemes are extorting the organizations that employ them and are increasingly...
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
US Charges Five People Over North Korean IT Worker Scheme – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US Department of Justice on Thursday announced charges against five individuals for their involvement in a North Korean IT...
CISA Warns of Old jQuery Vulnerability Linked to Chinese APT – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The US cybersecurity agency CISA on Thursday added an old jQuery flaw tracked as CVE-2020-11023 to its Known Exploited Vulnerabilities...
Millions Impacted by PowerSchool Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire School districts in the US and Canada say hackers stole all their historical data from a compromised PowerSchool service in...
Cyber Insights 2025: Social Engineering Gets AI Wings – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Cyber Insights 2025 examines expert opinions on the expected evolution of more than a dozen areas of cybersecurity interest over...
Hackers Earn $886,000 at Pwn2Own Automotive 2025 for Charger, OS, Infotainment Exploits – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The Pwn2Own Automotive 2025 hacking competition organized this week by Trend Micro’s Zero Day Initiative (ZDI) in Tokyo, Japan, has...
Friday Squid Blogging: Beaked Whales Feed on Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
Be careful what you say about data leaks in Turkey, new law could mean prison for reporting hacks – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley The Turkish government is proposing a controversial new cybersecurity law that could make it a criminal act to report on...
CISOs rücken näher an den Vorstand – Source: www.csoonline.com
Source: www.csoonline.com – Author: Eine aktuelle Studie zeigt: Angesichts der zunehmenden Bedeutung von Cybersicherheit gewinnen CISOs immer mehr Einfluss im Vorstand. Ein gutes Verhältnis zwischen CISO...
SonicWall’s Secure Mobile Access appliance faces zero-day attacks – Source: www.csoonline.com
Source: www.csoonline.com – Author: The bug affectq the management interfaces of SMA1000 Secure Mobile Access appliances, allowing the execution of arbitrary OS commands. A critical bug...
Grohe AG von Ransomware-Attacke betroffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Cyber-Bande Ransomhub erpresst die Grohe AG mit gestohlenen Daten. Die Ransomware-Bande Ransomhub will 100 Gigabyte Daten von der Grohe AG erbeutet...
Tricking the bad guys: realism and robustness are crucial to deception operations – Source: www.csoonline.com
Source: www.csoonline.com – Author: The tactic of luring bad actors into digital traps goes beyond honeypots, requiring robust infrastructure and highly realistic lures to gather intelligence...
GDPR fines hit €1.2 billion in 2024 on 8.3% more breach reports – Source: www.csoonline.com
Source: www.csoonline.com – Author: Corporation violations of GDPR rules resulted in total fines of €1.2 billion in 2024, according to a report from international law firm...
Prävention gegen Black Basta – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Black Basta-Gruppe hat auch über den Jahreswechsel hinaus gezielte Ransomware-Angriffe durchgeführt. So schützen sich Unternehmen gegen die neue Methode. Ein lückenloser...
AMD’s unpatched chip microcode glitch may require extreme measures by CISOs – Source: www.csoonline.com
Source: www.csoonline.com – Author: AMD has confirmed an unpatched “processor vulnerability” that may require CISOs to isolate their systems or even air gap them until there’s...
Warning to FortiGate admins: You need to run a compromise assessment now – Source: www.csoonline.com
Source: www.csoonline.com – Author: This comes after stolen configuration data and passwords from a two-year old hack were leaked last week. Network administrators with Fortinet’s FortiGate...
Palo Alto Networks firewalls have UEFI flaws, Secure Boot bypasses – Source: www.csoonline.com
Source: www.csoonline.com – Author: Security researchers have uncovered known firmware flaws in three Palo Alto enterprise firewall devices built on commodity hardware. Researchers have discovered that...
Phishing Emails Targeting Australian Firms Rise by 30% in 2024 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Fiona Jackson The number of phishing emails received by Australians surged by 30% last year, new research by security firm Abnormal Security...
War Game Pits China Against Taiwan in All-Out Cyberwar – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Kevin M. Law via Alamy Stock Photo If China attacked Taiwan, how could Taiwan defend its critical...
Tesla Gear Gets Hacked Multiple Times in Pwn2Own Contests – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: VDWI Automotive via Alamy Stock Photo NEWS BRIEF Researchers at the this year’s Pwn2Own Automotive...
CISA Calls For Action to Close the Software Understanding Gap – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the Defense Advanced Research Projects Agency (DARPA),...
Omdia Finds Phishing Attacks Top Smartphone Security Concern for Consumers – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE LONDON, Jan. 20, 2025 /PRNewswire/ — A new survey from Omdia reveals that phishing scams are the leading security threat for smartphone users, with...
Automox Releases Endpoint Management With FastAgent – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE AUSTIN, TX, Jan. 21, 2025 (GLOBE NEWSWIRE) — Automox launches FastAgent, a breakthrough in modern agent technology designed to deliver unprecedented speed,...
84% of Healthcare Organizations Spotted a Cyberattack in the Late Year – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE FRISCO, Texas, January 21, 2025 – Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security...
Cloudflare CDN Bug Outs User Locations on Signal, Discord – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Brian Jackson via Alamy Stock Photo A flaw in the widely used Cloudflare content delivery network (CDN)...
North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The FBI has warned that North Korean IT worker schemes are stealing data to extort their victims as part of efforts to...
Ransomware Gangs Linked by Shared Code and Ransom Notes – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Two recently identified ransomware gangs are using payloads that contain almost identical code, suggesting that the groups’ affiliates are using shared infrastructure....
Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors have been actively exploiting chained vulnerabilities in Ivanti Cloud Service Appliances (CSA), significantly amplifying the impact of their cyber-attacks. The...