Kaseya acquires decryption key "from trusted third party" after ransomware attack
Kaseya, the Miami-based software company at the centre of a ransomware attack which affected thousands of other businesses, says it has "obtained a decryptor" to unlock the victims' systems......»»
New infosec products of the week: May 3, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Cybersixgill, Proofpoint, Secure Code Warrior, Snyk, and Synopsys. Cybersixgill Third-Party Intelligence module identifies potential supply chain ri.....»»
Edgio ASM reduces risk from web application vulnerabilities
Edgio launched its Attack Surface Management (ASM) solution. ASM is designed to discover all web assets, provide full inventory of technologies, detect security exposures and manage exposure response across an organization from a centralized manageme.....»»
How transcripts in Apple Podcasts became a time-saving killer feature
There is no shortage of great third-party podcast clients on the App Store, such as Castro, Overcast, and Pocket Casts. But when Apple Podcasts introduced transcripts in iOS 17.4, the app immediately won me over. Podcast transcripts are a fantasti.....»»
Sideloading, third-party browser engines, and more are coming to the iPad in the EU this year
Earlier this week, the European Commission announced that iPadOS is now designated as a gatekeeper platform in the European Union, just like the iPhone and the App Store. In a new developer announcement today, Apple acknowledged this change and co.....»»
Apple won"t fight EU over iPad gatekeeper status, third-party App Stores coming
Despite the EU claiming that the iPad qualifies under its Digital Markets Act as a gatekeeper when it does not yet, Apple has announced that it will comply regardless.The EU is treating the iPad as a gatekeeper platform under its Digital Markets ActE.....»»
Bose has a bigger Bluetooth speaker to power your next pool party
Bose takes its popular SoundLink Flex and adds more muscle, as well as stereo sound, to create the SoundLink Max......»»
Snyk AppRisk Pro leverages AI and third-party integrations for faster risk mitigation
Snyk has released Snyk AppRisk Pro, pairing artificial intelligence (AI) with application context from third-party integrations to help application security (AppSec) and development teams address business-critical risk and accelerate fixes. Snyk AppR.....»»
Virsec releases security tools to offer ransomware protection
Virsec released TrustSight and TrustGuardian, its newest security tools in the fight against an ever-expanding threat environment – one where EDRs miss up to 30% of attacks, and ransomware detonates in milliseconds, according to various sources.....»»
AI-driven phishing attacks deceive even the most aware users
Vishing and deepfake phishing attacks are on the rise as attackers leverage GenAI to amplify social engineering tactics, according to Zscaler. AI automates and personalizes various aspects of the attack process AI-driven phishing attacks leverage AI.....»»
Health care giant comes clean about recent hack and paid ransom
Ransomware attack on the $371 billion company hamstrung US prescription market. Enlarge (credit: Getty Images) Change Healthcare, the health care services provider that recently experienced a ransomware attack that hamst.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
Account compromise of “unprecedented scale” uses everyday home devices
Credential-stuffing attack uses proxies to hide bad behavior. Enlarge (credit: Getty Images) Authentication service Okta is warning about the “unprecedented scale” of an ongoing campaign that routes fraudulent login.....»»
Jackbox Naughty Pack is the M-rated party game you’ve been waiting for
In lieu of a new Jackbox Party Pack game this year, we'll be getting a mature-rated Jackbox Naughty Pack......»»
iPhone web browser choice gets one thing right, two things wrong, say developers
Being prompted to make an iPhone web browser choice in Europe has seen an uptick in the use of third-party apps, but not everyone is happy about it. The EU itself is investigating whether Apple’s implementation of the antitrust requirement goes.....»»
Researchers unveil novel attack methods targeting Intel’s conditional branch predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry resea.....»»
Crime blotter: NYPD officer acquitted for 2021 punch in Apple Store
In this week's look at the Apple crime blotter, Canadian Police are looking into iPhone thefts, fraud has been alleged in third-party Apple Store pick-ups, an iPhone was stolen in a viral video, and more!The Apple Store on Manhattan's Upper West Side.....»»
Android TV has access to your entire account—but Google is changing that
Should sideloading Chrome on an old smart TV really compromise your entire account? Enlarge (credit: Google) Google says it has patched a nasty loophole in the Android TV account security system, which would grant attack.....»»
How to add friends in Sea of Thieves
If your crew is scattered to the winds, bring them together in Sea of Thieves by inviting them to your game. Here's how you can party up with your friends......»»
IBM acquires HashiCorp in multi-billion dollar deal to boost cloud reach
HashiCorp agrees to $6.4 billion takeover deal by IBM as the companies look to take on more of the market......»»
Political "color" affects pollution control spending in the US, new study finds
A new study led by the University of East Anglia (UEA) shows how firms in the United States behave differently depending on the political party in charge—even if they do not change policies......»»