Viry a Červi
Infosec experts divided on AI's potential to assist red teams
CANALYS FORUMS APAC Generative AI is being enthusiastically adopted in almost every field, but infosec experts are divided on whether it is truly helpful for red team raiders who test enterprise systems.…
Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish
Unknown criminals went on a phishing expedition that targeted about 20,000 users across the automotive, chemical and industrial compound manufacturing sectors in Europe, and tried to steal account credentials and then hijack the victims' Microsoft Azure cloud infrastructure.…
US reportedly mulls TP-Link router ban over national security risk
updated The Feds may ban the sale of TP-Link routers in the US over ongoing national security concerns about Chinese-made devices being used in cyberattacks.…
Microsoft won't let customers opt out of passkey push
Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success.…
Boffins trick AI model into giving up its secrets
Computer scientists from North Carolina State University have devised a way to copy AI models running on Google Edge Tensor Processing Units (TPUs), as used in Google Pixel phones and third-party machine learning accelerators.…
Phishers cast wide net with spoofed Google Calendar invites
Criminals are spoofing Google Calendar emails in a financially motivated phishing expedition that has already affected about 300 organizations with more than 4,000 emails sent over four weeks, according to Check Point researchers.…
Interpol wants everyone to stop saying 'pig butchering'
Interpol wants to put an end to the online scam known as "pig butchering" – through linguistic policing, rather than law enforcement.…
Critical security hole in Apache Struts under exploit
A critical security hole in Apache Struts 2 – patched last week – is currently being exploited using publicly available proof-of-concept (PoC) code.…
Ireland fines Meta for 2018 'View As' breach that exposed 30M accounts
It's been six years since miscreants abused some sloppy Facebook code to steal access tokens belonging to 30 million users, and the slow-turning wheels of Irish justice have finally caught up with a €251 million ($264 million) fine for the social media biz. …
BlackBerry offloads Cylance's endpoint security products to Arctic Wolf
BlackBerry's ambition to mix infosec and the Internet of Things has been squeezed, after the Canadian firm announced it is offloading Cylance's endpoint security products.…
Australia moves to drop some cryptography by 2030 – before quantum carves it up
Australia's chief cyber security agency has decided local orgs should stop using the tech that forms the current cryptographic foundation of the internet by the year 2030 – years before other nations plan to do so – over fears that advances in quantum computing could render it insecure.…
Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility
Supply chain integration vendor Cleo has urged its customers to upgrade three of its products after an October security update was circumvented, leading to widespread ransomware attacks that Russia-linked gang Cl0p has claimed are its evil work.…
Trump administration wants to go on cyber offensive against China
President-elect Donald Trump's team wants to go on the offensive against America's cyber adversaries, though it isn't clear how the incoming administration plans to achieve this. …
Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'
A cyberattack on a Deloitte-managed government system in Rhode Island carries a "high probability" of sensitive data theft, the state says.…
Are your Prometheus servers and exporters secure? Probably not
Infosec in brief There's a problem of titanic proportions brewing for users of the Prometheus open source monitoring toolkit: hundreds of thousands of servers and exporters are exposed to the internet, creating significant security risks and leaving organizations vulnerable to attack.…
Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks
An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according to security researchers.…
Scumbag gets 30 years in the clink for running CSAM dark-web chatrooms, abusing kids
A Texan who ran a forum on the dark web where depraved netizens could swap child sex abuse material (CSAM), and chat freely about abusing kids, has been sentenced to 30 years in prison.…
Google Timeline location purge causes collateral damage
A year ago, Google announced plans to save people's Location History, which it now calls Timeline, locally on devices rather than on its servers.…
Cyber protection made intuitive and affordable
Partner Content Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running.…
Taming the multi-vault beast
Partner Content With Non-Human Identities (NHIs) now outnumbering human users 100 to one in enterprise environments, managing secrets across multiple vaults has become a significant security concern.…
- 1
- 2
- 3
- 4
- 5
- 6
- následující ›
- poslední »