12 Jul

White House urged to double check Microsoft isn’t funneling AI to China via G42 deal

Two House committee chairs have sent a public letter to the White House asking it to look into a deal between AI R&D outfit G42

Author rabih
12 Jul

CISA broke into a US federal agency, and no one noticed for a full 5 months

The US Cybersecurity and Infrastructure Security Agency (CISA) says a red team exercise at a certain unnamed federal agency in 2023 revealed a string of

Author rabih
12 Jul

Identity: the new security perimeter

Webinar Threat actors are always looking for that easy way in by testing weak spots, and user identities are one of their favourite targets. Multi

Author rabih
12 Jul

Break-in at ‘third-party cloud platform’ leaked 110M customer records, says AT&T

AT&T has admitted that cyberattackers grabbed a load of its data for the second time this year, and if you think the first haul was

Author rabih
12 Jul

Should ransomware payments be banned? – Week in security with Tony Anscombe

Video The issue of whether to ban ransomware payments is a hotly debated topic in cybersecurity and policy circles. What are the implications of outlawing

Author rabih
12 Jul

Singapore’s banks to ditch texted one-time passwords

After around two decades of allowing one-time passwords (OTPs) delivered by text message to assist log ins to bank accounts in Singapore, the city-state will

Author rabih
12 Jul

China’s APT41 crew adds a stealthy malware loader and fresh backdoor to its toolbox

Chinese government-backed cyber espionage gang APT41 has very likely added a loader dubbed DodgeBox and a backdoor named MoonWalk to its malware toolbox, according to

Author rabih
12 Jul

‘Gay furry hackers’ say they’ve disbanded after raiding Project 2025’s Heritage Foundation

After claiming to break into a database belonging to The Heritage Foundation, and then leaking 2GB of files belonging to the ultra-conservative think tank, the

Author rabih
11 Jul

You had a year to patch this Veeam flaw – and now it’s going to hurt some more

Yet another new ransomware gang, this one dubbed EstateRansomware, is now exploiting a Veeam vulnerability that was patched more than a year ago to deploy

Author rabih
11 Jul

OpenSSH bug leaves RHEL 9 and the RHELatives vulnerable

The founder of Openwall has discovered a new signal handler race condition in the core sshd daemon used in RHEL 9.x and its various offshoots.

Author rabih
11 Jul

Advance Auto Parts: 2.3M people’s data accessed when crims broke into our Snowflake account

Advance Auto Parts’ CISO just revealed for the first time the number of individuals affected when criminals broke into its Snowflake instance – a hefty

Author rabih
11 Jul

Privacy expert put away for 9 years after ‘grotesque’ cyberstalking campaign

A scumbag who used to work as a privacy consultant has been put behind bars for nine years for a “grotesque” cyberstalking campaign against more

Author rabih
11 Jul

You had a year to patch this Veeam flaw and now it’s going to hurt

Yet another new ransomware gang, this one dubbed EstateRansomware, is exploiting a Veeam vulnerability that was patched more than a year ago to drop file-encrypting

Author rabih
11 Jul

Japanese space agency spotted zero-day attacks while cleaning up attack on M365

The Japanese Space Exploration Agency (JAXA) discovered it was under attack using zero-day exploits while working with Microsoft to probe a 2023 cyberattack on its

Author rabih
10 Jul

Snowflake lets admins make MFA mandatory across all user accounts

A month after incident response giant Mandiant suggested the litany of data thefts linked to Snowflake account intrusions had the common component of lacking multi-factor

Author rabih
10 Jul

Malware that is ‘not ransomware’ wormed its way through Fujitsu Japan’s systems

Fujitsu Japan says an unspecified “advanced” malware strain was to blame for a March data theft, insisting the strain was “not ransomware”, yet it hasn’t

Author rabih
10 Jul

Ransomware crews investing in custom data stealing malware

As ransomware crews increasingly shift beyond just encrypting victims’ files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of

Author rabih
10 Jul

Understanding IoT security risks and how to mitigate them | Cybersecurity podcast

Video, Internet of Things As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and

Author rabih
Load moreLoadingAll items loaded