Category: Uncategorized
-
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities [email protected] (The Hacker News)
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in the form of Remote Desktop Protocol (‘.rdp’Read More
-
Relearning past lessons in assessing cloud risk
Post ContentRead More
-
Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite [email protected] (The Hacker News)
A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. “This flaw allows an unauthenticated local attacker toRead…
-
Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security [email protected] (The Hacker News)
Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the “most advanced security architecture ever deployed for cloud AI compute at scale.” With…
-
DDoS mitigation: How to stop DDoS attacks
Post ContentRead More
-
Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof? [email protected] (The Hacker News)
Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AI-based attacks are not just theoretical threats—they’re happening across industries and outpacing traditional defense mechanisms. The solution, however, is not futuristic. It turns out a properly designed identity security platform is able to deliver…
-
SEC Charges 4 Companies Over Misleading SolarWinds Cyberattack Disclosures [email protected] (The Hacker News)
The U.S. Securities and Exchange Commission (SEC) has charged four current and former public companies for making “materially misleading disclosures” related to the large-scale cyber attack that stemmed from the hack of SolarWinds in 2020. The SEC said the companies – Avaya, Check Point, Mimecast, and Unisys – are being penalized for how they handled…
-
Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations [email protected] (The Hacker News)
The Irish data protection watchdog on Thursday fined LinkedIn €310 million ($335 million) for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising. “The inquiry examined LinkedIn’s processing of personal data for the purposes of behavioral analysis and targeted advertising of users who have created LinkedIn profiles (members),”…
-
Cisco ASA and FTD zero day used in password spraying attacks
Post ContentRead More
-
New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics [email protected] (The Hacker News)
Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. “Notably, Qilin.B now supports AES-256-CTR encryption for systems with AESNI capabilities, while still retaining Chacha20 for systems that lack this supportRead More