10 Jun

Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack

Patch Tuesday It’s Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out – and two

Author rabih
10 Jun

Texas warns 300,000 crash reports siphoned via compromised user account

The Texas Department of Transportation says a compromised user account was used to improperly download nearly 300,000 crash reports, exposing personal data that could be

Author rabih
10 Jun

Critical Wazuh bug exploited in growing Mirai botnet infection

Cybercriminals are trying to spread multiple Mirai variants by exploiting a critical Wazuh vulnerability, researchers say – the first reported active attacks since the code

Author rabih
10 Jun

Winning the war on ransomware with AI: Four real-world use cases

Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s

Author rabih
10 Jun

Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud

President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”

Author rabih
10 Jun

Cloud brute-force attack cracks Google users’ phone numbers in minutes

A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs. The

Author rabih
10 Jun

M&S online ordering system operational 46 days after cyber shutdown

UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack in April. According

Author rabih
10 Jun

Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser

Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible. Supporting

Author rabih
10 Jun

Apple tries to contain itself with lightweight Linux VMs for macOS

Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac. Software containers combine applications and their

Author rabih
09 Jun

Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack

North American grocery wholesaler United Natural Foods told regulators that a cyber incident temporarily disrupted operations, including its ability to fulfill customer orders. In a

Author rabih
09 Jun

Blocking stolen phones from the cloud can be done, should be done, won’t be done

Opinion A lot of our tech world is nightmarish, but sometimes this is literally true. The fear of our mobile devices not working when we

Author rabih
09 Jun

Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs

An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have

Author rabih
09 Jun

Are technologists a threat to doing business securely?

Partner content Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a

Author rabih
09 Jun

China’s asteroid-and-comet hunter probe unfurls a ‘solar wing’

China’s space agency has revealed its Tianwen 2 probe has unfurled a ‘solar wing’. The mission launched in May on a course that will take

Author rabih
08 Jun

US infrastructure could crumble under cyberattack, ex-NSA advisor warns

Infosec in Brief If a cyberattack hit critical infrastructure in the US, it would likely crumble, former deputy national security adviser and NSA cybersecurity director

Author rabih
08 Jun

Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs

Interview Before AI becomes commonplace in enterprises, corporate leaders have to commit to an ongoing security testing regime tuned to the nuances of AI models.

Author rabih
06 Jun

ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist

Fake IT workers possibly linked to North Korea, Beijing-backed cyber operatives, and Russian malware slingers are among the baddies using ChatGPT for evil, according to

Author rabih
06 Jun

Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure

A new strain of wiper malware targeting Ukrainian infrastructure is being linked to pro-Russian hackers, in the latest sign of Moscow’s evolving cyber tactics. An

Author rabih
Load moreLoadingAll items loaded