11 Dec

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most

Author rabih
11 Dec

2.5M patents infected with data loss in Norton Healthcare ransomware outbreak

Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most

Author rabih
11 Dec

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Research into Lazarus Group’s attacks using Log4Shell has revealed novel malware strains written in an atypical programming language. DLang is among the newer breed of

Author rabih
11 Dec

Two years on, 1 in 4 apps still vulnerable to Log4Shell

Two years after the Log4Shell vulnerability in the open source Java-based Log4j logging utility was disclosed, circa one in four applications are dependent on outdated

Author rabih
11 Dec

Read the clouds, reduce the cyber risk

Webinar In the natural world, there are ten different kinds of cloud – a rare simplicity in meteorological terms. But in our global business environment,

Author rabih
11 Dec

Black Hat Europe 2023: Should we regulate AI?

We Live Progress ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past? Tony

Author rabih
11 Dec

23andMe responds to breach with new suit-limiting user terms

Security in brief The saga of 23andMe’s mega data breach has reached something of a conclusion, with the company saying its probe has determined millions

Author rabih
11 Dec

Silent but deadly: The rise of zero-click attacks

Mobile Security A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this

Author rabih
11 Dec

VictoriaMetrics takes organic growth over investor pressure

Interview Monitoring biz VictoriaMetrics is relatively unusual in its field. It is yet to accept external investment, preferring instead to try to grow organically rather

Author rabih
09 Dec

Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky

An unknown pro-Russia influence group spent time recruiting unwitting Hollywood actors to assist in smear campaigns against Ukraine and its president Volodymyr Zelensky. Exploiting platforms

Author rabih
08 Dec

Deepfake Defense: Your 8-Step Shield Against Digital Deceit

A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users of a deepfake app. Their

Author rabih
08 Dec

Competing Section 702 surveillance bills on collision path for US House floor

Two competing bills to reauthorize America’s FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a

Author rabih
08 Dec

That call center tech scammer could be a human trafficking victim

Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated. Interpol revealed this

Author rabih
08 Dec

Safer AI: Four Questions Shaping Our Digital Future

Depending on the day’s most popular headlines, AI is either a panacea or the ultimate harbinger of doom. We could solve the world’s problems if

Author rabih
08 Dec

Surge in deceptive loan apps – Week in security with Tony Anscombe

Video ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi 08 Dec 2023

Author rabih
08 Dec

Black Hat Europe 2023: The past could return to haunt you

Critical Infrastructure Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks. Tony Anscombe 08 Dec 2023  •  ,

Author rabih
08 Dec

Polish train maker denies claims its software bricked rolling stock maintained by competitor

A trio of Polish security researchers claim to have found that trains built by Newag SA contain software that sabotages them if the hardware is

Author rabih
08 Dec

Five Eyes nations warn Moscow’s mates at the Star Blizzard gang have new phishing targets

Russia-backed attackers have named new targets for their ongoing phishing campaigns, with defense-industrial firms and energy facilities now in their sights, according to agencies of

Author rabih
Load moreLoadingAll items loaded