14 Sep

Data destruction done wrong could cost your company millions

With the end of Windows 10’s regular support cycle fast approaching, and a good five years since the COVID pandemic spurred a wave of hardware

Author rabih
12 Sep

HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows

Author rabih
12 Sep

Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages

Samsung has fixed a critical flaw that affects its Android devices – but not before attackers found and exploited the bug, which could allow remote

Author rabih
12 Sep

All your vulns are belong to us! CISA wants to maintain gov control of CVE program

The Cybersecurity and Infrastructure Security Agency (CISA) nearly let the Common Vulnerabilities and Exposures (CVE) program lapse earlier this year, but a new “vision” document

Author rabih
12 Sep

1,200 undergrads hung out to dry after jailbreak attack on laundry machines

More than a thousand university students in the Netherlands must continue to travel to wash their clothes after their building management company failed to bring

Author rabih
12 Sep

Privacy activists warn digital ID won’t stop small boats – but will enable mass surveillance

A national digital ID could hand the government the tools for population-wide surveillance – and if history is anything to go by, ministers probably couldn’t

Author rabih
12 Sep

Hack to school: Parents told to keep their little script kiddies in line

The UK’s data protection watchdog says more than half of cyberattacks in schools are caused by students, and that parents should act early to prevent

Author rabih
12 Sep

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising

Author rabih
12 Sep

Huntress’s ‘hilarious’ attacker surveillance splits infosec community

Security outfit Huntress has been forced onto the defensive after its latest research – described by senior staff as “hilarious” – split opinion across the

Author rabih
11 Sep

We’re number 1! America now leads the world in surveillanceware investment

After years of being dominated by outsiders, the computer surveillance software industry is booming in the United States as investors rush into the ethically dodgy

Author rabih
11 Sep

Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand

Multiple attackers using a new phishing service dubbed VoidProxy to target organizations’ Microsoft and Google accounts have successfully stolen users’ credentials, multi-factor authentication codes, and

Author rabih
11 Sep

AI-powered penetration tool, an attacker’s dream, downloaded 10K times in 2 months

Villager, a new penetration-testing tool linked to a suspicious China-based company and described by researchers as “Cobalt Strike’s AI successor,” has been downloaded about 10,000

Author rabih
11 Sep

Anti-DDoS outfit walloped by record packet flood

A DDoS mitigation provider was given a taste of the poison it tries to prevent, after being smacked by one of the largest packet-rate attacks

Author rabih
11 Sep

Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets

If you thought the world was done with side-channel CPU attacks, think again. ETH Zurich has identified yet another Spectre-based transient execution vulnerability that affects

Author rabih
11 Sep

Senator blasts Microsoft for ‘dangerous, insecure software’ that helped pwn US hospitals

Microsoft is back in the firing line after US Senator Ron Wyden accused Redmond of shipping “dangerous, insecure software” that helped cybercrooks cripple one of

Author rabih
11 Sep

Brussels faces privacy crossroads over encryption backdoors

Europe, long seen as a bastion of privacy and digital rights, will debate this week whether to enforce surveillance on citizens’ devices. Representatives from member

Author rabih
11 Sep

Attacker steals customer data from Brit rail operator LNER during break-in at supplier

One of the UK’s largest rail operators, LNER, is the latest organization to spill user data via a third-party data breach. It confirmed the incident

Author rabih
11 Sep

Experts scrutinized Ofcom’s Online Safety Act governance. They’re concerned

Industry experts expressed both concern and sympathy for Ofcom, the Brit regulator that is overseeing the Online Safety Act, as questions mount over the effectiveness

Author rabih
Load moreLoadingAll items loaded