24 Mar

FCC on the prowl for Huawei and other blocked Chinese makers in America

The FCC is investigating whether Chinese manufacturers black-listed on its so-called Covered List – including Huawei – are still somehow doing business in America, either

Author rabih
24 Mar

As nation-state hacking becomes ‘more in your face,’ are supply chains secure?

Interview Former US Air Force cyber officer Sarah Cleveland worries about the threat of a major supply-chain attack from China or another adversarial nation. So

Author rabih
24 Mar

AI agents swarm Microsoft Security Copilot

Microsoft’s Security Copilot is getting some degree of agency, allowing the underlying AI model to interact more broadly with the company’s security software to automate

Author rabih
24 Mar

23andMe’s genes not strong enough to avoid Chapter 11

Beleaguered DNA testing biz 23andMe – hit by a massive cyber attack in 2023 – is filing for bankruptcy protection in the US following years

Author rabih
24 Mar

Is Washington losing its grip on crypto, or is it a calculated pivot to digital dominance?

Analysis Is the US retreating from its hardline stance on crypto? On Friday, the US Treasury Department lifted sanctions imposed on notorious crypto mixer Tornado

Author rabih
24 Mar

Microsoft tastes the unexpected consequences of tariffs on time

Opinion Never attribute to malice that which is adequately explained by stupidity. This works well in sane times, less so when “but it’s both” is

Author rabih
24 Mar

Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns

Infosec In Brief Organized crime networks are now reliant on digital tech for most of their activities according to Europol, the European agency that fights

Author rabih
23 Mar

China bans compulsory facial recognition and its use in private spaces like hotel rooms

Asia In Brief China’s Cyberspace Administration and Ministry of Public Security have outlawed the use of facial recognition without consent. The two orgs last Friday

Author rabih
23 Mar

Oracle Cloud says it’s not true someone broke into its login servers and stole data

Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information stolen. A crook late last week

Author rabih
23 Mar

Ex-NSA boss: Election security focus helped dissuade increase in Russian meddling with US

Interview Russia appears to be having second thoughts on how aggressively, or at least how visibly, it attempts to influence American elections, according to a

Author rabih
23 Mar

Ex-NSA boss: Good news. Election security focus helped dissuade increase in Russian meddling with US

Interview Russia appears to be having second thoughts on how aggressively, or at least how visibly, it attempts to influence American elections, according to a

Author rabih
21 Mar

AdTech CEO whose products detected fraud jailed for financial fraud

The former CEO of Kubient, an advertising tech company that developed a cloudy product capable of detecting fraudulent ads, has been jailed for fraud. CEO

Author rabih
21 Mar

Paragon spyware deployed against journalists and activists, Citizen Lab claims

Infosec newsbytes Israeli spyware maker Paragon Solutions pitches its tools as helping governments and law enforcement agencies to catch criminals and terrorists, but a fresh

Author rabih
21 Mar

Capital One cracker could be sent back to prison after judges rule she got off too lightly

Paige Thompson, the perpetrator of the Capital One data theft, may be sent back behind bars after an appeals court ruled her sentence of time

Author rabih
20 Mar

Dept of Defense engineer took home top-secret docs, booked a fishing trip to Mexico – then the FBI showed up

A US Department of Defense electrical engineer has turned his world upside down after printing 155 pages from 20 documents, all of which were marked

Author rabih
20 Mar

Infoseccers criticize Veeam over critical RCE vulnerability and a failing blacklist

In patching the latest critical remote code execution (RCE) bug in Backup and Replication, software shop Veeam is attracting criticism from researchers for the way

Author rabih
20 Mar

Too many software supply chain defense bibles? Boffins distill advice

Organizations concerned about software supply chain attacks should focus on role-based access control, system monitoring, and boundary protection, according to a new preprint paper on

Author rabih
20 Mar

The post-quantum cryptography apocalypse will be televised in 10 years, says UK’s NCSC

The UK’s National Cyber Security Centre (NCSC) today started the post-quantum cryptography (PQC) countdown clock by claiming organizations have ten years to migrate to a

Author rabih
Load moreLoadingAll items loaded