22 Nov

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking

The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay

Author rabih
22 Nov

Helpline for Yakuza victims fears it leaked their personal info

A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led to a leak of

Author rabih
22 Nov

Here’s what happens if you don’t layer network security – or remove unused web shells

The US Cybersecurity and Infrastructure Agency often breaks into critical organizations’ networks – with their permission, of course – to simulate real-world cyber attacks and

Author rabih
21 Nov

DARPA-backed voting system for soldiers abroad savaged

An electronic voting project backed by DARPA – Uncle Sam’s boffinry nerve center – to improve the process of absentee voting for American military personnel

Author rabih
21 Nov

‘Alarming’ security bugs lay low in Linux’s needrestart server utility for 10 years

Researchers at Qualys refuse to release exploit code for five bugs in the Linux world’s needrestart utility that allow unprivileged local attackers to gain root

Author rabih
21 Nov

Chinese ship casts shadow over Baltic subsea cable snipfest

The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea

Author rabih
21 Nov

‘Alarming’ bugs lay low in Ubuntu Server utility for 10 years

Researchers at Qualys refuse to release exploit code for five bugs in Ubuntu Server’s needrestart utility that allow unprivileged attackers to gain root access without

Author rabih
21 Nov

Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259!

In May 2020, NIST published Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259), which describes recommended cybersecurity activities that manufacturers should consider performing

Author rabih
21 Nov

Now Online Safety Act is law, UK has ‘priorities’ – but still won’t explain ‘spy clause’

The UK government has set out plans detailing how it will use the new law it has created to control online platforms and social media

Author rabih
21 Nov

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET researchers have identified multiple samples of Linux backdoor, which we have named WolfsBane, that we attribute with high confidence to the Gelsemium advanced persistent

Author rabih
21 Nov

Put your usernames and passwords in your will, advises Japan’s government

Japan’s National Consumer Affairs Center on Wednesday suggested citizens start “digital end of life planning” and offered tips on how to do it. The Center’s

Author rabih
21 Nov

Five Scattered Spider suspects indicted for phishing spree and crypto heists

The US Department of Justice has issued an indictment that names five people accused of stealing millions in cryptocurrency – and we are told they

Author rabih
20 Nov

Chinese cyberspies, Musk’s Beijing ties, labelled ‘real risk’ to US security by senator

A senior US senator has warned that American tech companies’ activities in China represent a national security risk, in a hearing that saw infosec biz

Author rabih
20 Nov

Mega US healthcare payments network restores system 9 months after ransomware attack

Still reeling from its February ransomware attack, Change Healthcare confirms its clearinghouse services are back up and running, almost exactly nine months since the digital

Author rabih
20 Nov

Google’s AI bug hunters sniff out two dozen-plus code gremlins that humans missed

Google’s OSS-Fuzz project, which uses large language models (LLMs) to help find bugs in code repositories, has now helped identify 26 vulnerabilities, including a critical

Author rabih
20 Nov

D-Link tells users to trash old VPN routers over bug too dangerous to identify

Owners of older models of D-Link VPN routers are being told to retire and replace their devices following the disclosure of a serious remote code

Author rabih
20 Nov

Kathryn Thornton: Correcting Hubble’s vision | Starmus Highlights

We Live Science The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s

Author rabih
20 Nov

Data is the new uranium – incredibly powerful and amazingly dangerous

I recently got to play a ‘fly on the wall’ at a roundtable of chief information security officers. Beyond the expected griping and moaning about

Author rabih
Load moreLoadingAll items loaded