Hyundai has disclosed a data breach impacting Italian and French car owners and those who booked a test drive, warning that hackers gained access to personal...
How to Secure Web Applications in a Growing Digital Attack Surface
External web applications can prove difficult to secure and are often targeted by hackers due to the range of vulnerabilities they may contain. These risks, which...
Microsoft Bing introduces ChatGPT answers in search results
Microsoft has introduced a new update to Bing.com that includes a significant change in its search results — the addition of ChatGPT responses to search queries....
Microsoft (& Apple) Patch Tuesday, April 2023 Edition
Microsoft today released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being...
KFC owner suffers data breach following ransomware attack
Note: This article was updated on April 12, 2023, to reflect the fact that employee data, not customer data, was accessed during the cyber attack against...
10 Free & Open-Source Threat-Hunting Tools for 2023
Are you on the lookout for threat-hunting tools? If so, you’ve come to the right place. Compared to network security systems that include appliances such as...
Patch Tuesday April 2023 – Microsoft Publishes Fixes for 17 Known Vulnerabilities
Heimdal® returns with the Easter edition of our Patch Tuesday series with more news from the vulnerability management front. Throughout April, Microsoft has launched 17 security...
Google Cloud offers Assured Open Source Software for free
Image: Google Open source software and software supply chain security risks continue to be a primary concern for developers and organizations. According to a 2022 study...
Cybersecurity leaders see risk from email attacks, hybrid work
on April 12, 2023, 6:17 PM EDT Cybersecurity leaders see risk from email attacks, hybrid work Graymail, phishing, vendor impersonation, and other BECs clogging up security...
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
on April 12, 2023, 4:47 PM EDT TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download TechRepublic Premium content helps you solve your...
As the west tries to limit TikTok’s reach, what about China’s other apps?
As TikTok, the world’s most popular app, comes under increasing scrutiny in response to data privacy and security concerns, lawmakers in the west may soon set...
Data on 400K Kodi Forum Members Stolen and Put Up for Sale
The Kodi forum (MyBB) is a place where about 400,000 users of the Kodi open source media player come together to share tips on customizing their...
Microsoft: NSO Group-Like ‘QuaDream’ Actor Selling Mobile Spyware to Governments
Microsoft has identified another Israel-based threat organization, similar to NSO Group, that is selling mobile spyware and other cyber espionage tools and services to international governments...
10 things to look out for when buying a password manager
Here’s how to choose the right password vault for you and what exactly to consider when weighing your options 11 Apr 2023 – 11:30AM Here’s how...
LastPass Breach Reveals Important Lessons
The LastPass breach will be remembered as paradigmatic. The blast radius from this August 2022 breach grew from bad to catastrophic during a six-month period. Initially,...
1M+ WordPress Sites Hacked via Zero-Day Plug-in Bugs
At least 1 million websites that run on WordPress have been infected by a campaign that uses rafts of WordPress plug-in and theme vulnerabilities to inject...
Rethinking Cybersecurity’s Structure & the Role of the Modern CISO
Effective cybersecurity operations are as unique as the business models and technology choices of the companies they protect. Their creation and management are constantly complicated by...
Top Tech Talent Warns of AI’s Threat to Human Existence in Open Letter
More than 1,000 of technology’s top talent names — including Twitter CEO Elon Musk, Apple co-founder Steve Wozniak, and politician Andrew Yang — have signed an...
FBI Advising People to Avoid Public Charging Stations
The FBI is warning people against using public phone-charging stations, worrying that the combination power-data port can be used to inject malware onto the devices: Avoid...
Researchers Uncover 7000 Malicious Open Source Packages
Security vendor Sonatype detected 6933 malicious open source packages in the month of March alone, bringing the total discovered since 2019 to 115,165. Info-stealers comprised a...
New Zero-Click iOS Exploit Deploys Israeli Spyware
Security researchers have discovered a new zero-click, zero-day exploit that targeted iPhone users in 2021 with commercial spyware produced by secretive Israeli firm QuaDream. Microsoft and...
Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities
OpenAI is offering white hat hackers up to $20,000 to find security flaws as part of its bug bounty program launched on April 11, 2023. The...
Microsoft Fixes Zero-Day Bug This Patch Tuesday
Microsoft’s Patch Tuesday release this month included a security update for a Windows zero-day vulnerability being actively exploited in the wild. The bug in question, CVE-2023-28252,...
SAP April 2023 security updates fix critical vulnerabilities
April 12, 2023 By Pierluigi Paganini SAP fixed two critical bugs that affect the Diagnostics Agent and the BusinessObjects Business Intelligence Platform. SAP April 2023 security updates include...
OpenAI launched a bug bounty program
AI company OpenAI launched a bug bounty program and announced payouts of up to $20,000 for security flaws in its ChatGPT chatbot service. OpenAI launched a...
Cybercrime group exploits Windows zero-day in ransomware attacks
Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has addressed a zero-day vulnerability, tracked as...
A “By-Design” flaw in Microsoft Azure can allow storage accounts takeover
A flaw in Microsoft Azure could be exploited by attackers to gain access to storage accounts, perform lateral movements, and even execute remote code. Researchers from...
Yum! Brands, the owner of KFC, Taco Bell and Pizza Hut, discloses data breach
Yum! Brands, the company that owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a data breach after the January ransomware attack. On January 13,...
SAP releases security updates for two critical-severity flaws
Enterprise software vendor SAP has released its April 2023 security updates for several of its products, which includes fixes for two critical-severity vulnerabilities that impact the...
OpenAI launches bug bounty program with rewards up to $20K
AI research company OpenAI announced today the launch of a new bug bounty program to allow registered security researchers to discover vulnerabilities in its product line...