14 dead as Hezbollah walkie-talkies explode in second, deadlier attack
People aren't sure what devices will go boom next. Enlarge (credit: Aurich Lawson | Getty Images) Wireless communication devices have exploded again today across Lebanon in a second attack even deadlier than yesterday's.....»»
Week in review: PostgreSQL databases under attack, new Chrome zero-day actively exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PostgreSQL databases under attack Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers......»»
This new Android malware can steal your card details via the NFC chip
Security researchers spot a sophisticated attack that steals people's NFC data and can be used to steal money, and more......»»
Wallarm API Attack Surface Management mitigates API leaks
Wallarm announced its latest innovation: API Attack Surface Management (AASM). This agentless technology transforms how organizations identify, analyze, and secure their entire API attack surface. Designed for effortless deployment, Wallarm AASM empo.....»»
With 145 sickened, 2 dead, microdosing candy poisonings are still a mystery
FDA keeps testing—and keeps finding new drugs. But they don't explain the cases. Enlarge (credit: Diamond Shruumz) The number of poisonings connected to Diamond Shruumz-brand microdosing candies has reached 145 cases a.....»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
A survival guide for data privacy in the age of federal inaction
Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law (APRA) be to the EU’s GDPR?” Now that APRA is pretty much dead on ar.....»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Top architectural firm reveals it was hit by major ransomware attack
CannonDesign starts notifying people a year and a half after the incident......»»
Surprising mechanism for removing dead cells identified
Billions of our cells die every day to make way for the growth of new ones. Most of these goners are cleaned up by phagocytes—mobile immune cells that migrate where needed to engulf problematic substances. But some dying or dead cells are consumed.....»»
PostgreSQL databases under attack
Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»
Average DDoS attack costs $6,000 per minute
2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack duration increases DDoS attacks surged 106% from H2 2023 to H1 2024. The.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
How researchers determined that Stonehenge"s giant Altar Stone came all the way from northeast Scotland
No one is certain why Stonehenge was built. This world-famous monument on Salisbury Plain in Wiltshire is thought to commemorate the dead, and is aligned with movements of the sun and moon......»»
This Mpox Outbreak Isn"t Like the Last One
The strain of mpox behind the current global health emergency is believed to be up to 10 times deadlier than the one that swept the globe in 2022......»»
Banshee Stealer malware haunts browser extensions on macOS
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»
A rarely seen deep sea fish is found in California, and scientists want to know why
A rarely seen deep sea fish resembling a serpent was found floating dead on the ocean surface off the San Diego coast and was brought ashore for study, marine experts said......»»
DDoS attack volume rises, peak power reaches 1.7 Tbps
The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore. Peak attack power rose from 1.6 terabits per second (Tbps) in H2 2023 to 1.7 Tbps. DDoS attacks hit Gaming, tech, fi.....»»
Fish in Greenland consume more jellyfish than previously assumed, researchers discover
For a long time, scientists assumed that jellyfish were a dead-end food source for predatory fish. However, a team from the Alfred Wegener Institute together with the Thünen Institute has now discovered that fish in Greenland waters do indeed feed o.....»»
Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine Memor.....»»