27 Apr

Study: How Amazon uses Echo smart speaker conversations to target ads

Amazon and third-party services have been using smart speaker interaction data for ad targeting, in violation of privacy commitments, according to researchers at four US

Author rabih
26 Apr

Who is exploiting VMware right now? Probably Iran’s Rocket Kitten, to name one

A team of Iranian cyber-spies dubbed Rocket Kitten, for one, is likely behind attempts to exploit a critical remote-code execution vulnerability in VMware’s identity management

Author rabih
26 Apr

Coca-Cola probes pro-Kremlin gang’s claims of 161GB data theft

Coca-Cola confirmed it’s probing a possible network intrusion after the Stormous cybercrime gang claimed it stole 161GB of data from the beverage giant. “We are

Author rabih
26 Apr

USA’s plan to decouple its tech with China lacks a strategy – report

The USA’s policy of decoupling its technology industries from China lacks a strategy, a theory of success, and an understanding of how to achieve its

Author rabih
26 Apr

DDoS attacks at an all-time-high in Q1 2022, says Kaspersky

Kaspersky has released a report showing Distributed Denial of Service (DDoS) attacks hit an all-time-high in the first quarter of 2022. The attacks detected by

Author rabih
26 Apr

Microsoft fixes Point of Sale bug that delayed Windows 11 startup for 40 minutes

A fresh Windows 11 patch slipped out overnight as an optional update, but contains an impressively long list of fixes for Microsoft’s flagship operating system.

Author rabih
26 Apr

India inks tech pact with EU – only the US has the same deal

India’s government and the European Union have signed up to create a “Trade and Technology Council” – an entity the EU has previously only created

Author rabih
26 Apr

Crooks steal NFTs worth ‘$3m’ in Bored Ape Yacht Club heist

Crooks stole non-fungible tokens (NFTs) said to be worth about $3 million after breaking into the Bored Ape Yacht Club’s Instagram account and posting a

Author rabih
25 Apr

Intuit sued over alleged cryptocurrency thefts via Mailchimp intrusion

Intuit is being sued in the US after a security failure at its Mailchimp email marketing business allegedly led to the theft of cryptocurrency from

Author rabih
25 Apr

Homeland Security bug bounty program uncovers 122 holes in its systems

The first bug bounty program by America’s Homeland Security has led to the discovery and disclosure of 122 vulnerabilities, 27 of which were deemed critical.

Author rabih
25 Apr

Flaw could have granted criminals control over Ever Surf crypto wallets

A flaw detected in the browser version of the Ever Surf cryptocurrency wallet could have given hackers who exploited it full control over a targeted

Author rabih
25 Apr

Malware analysis report on SparrowDoor malware

The NCSC malware analysis report on a variant of the SparrowDoor malware is available below, along with indicators of compromise, STIX and detection rules. The

Author rabih
25 Apr

The Application of Cybersecurity for IoT Capabilities to Real-World Scenarios

NIST has a history of collaboration between its programs, which helps maximize project impacts and practicality to industry. One great example is between NIST’s National

Author rabih
25 Apr

FBI: BlackCat ransomware scratched 60-plus orgs

In brief The BlackCat ransomware gang, said to be the first-known ransomware group to successfully break into networks with Rust-written malware, has attacked at least

Author rabih
23 Apr

Now Mandiant says 2021 was a record year for exploited zero-day security bugs

The number of zero-day vulnerabilities exploited in the wild reached an all-time high last year, according to Mandiant. The security shop identified 80 such actively

Author rabih
22 Apr

US DOJ probes Google’s $5.4b Mandiant acquisition

Federal regulators are taking a closer look at Google’s planned $5.4 billion acquisition of Mandiant, a deal designed to boost the web giant’s public cloud’s

Author rabih
22 Apr

Hive ransomware affiliate zeros in on Exchange servers

An affiliate of the aggressive Hive ransomware group is exploiting known vulnerabilities in Microsoft Exchange servers to encrypt and exfiltrate data and threaten to publicly

Author rabih
22 Apr

REvil resurrected? Ransomware crew appears to be back. Keyword: Appears

The notorious REvil ransomware gang appears to have returned from the bowels of the dark web, three months after the arrest of 14 of its

Author rabih
Load moreLoadingAll items loaded