Attack automation becomes a prevalent threat against APIs
The second half of 2022 marked a significant turning point in the security landscape. In several high-profile incidents, application programming interfaces (APIs) emerged as a primary attack vector, posing a new and significant threat to organization.....»»
This new threat proves that Macs aren’t immune from malware
The latest malware threat for Mac users targets popular browsers that you could be using this very instant. Which ones are affected?.....»»
During a heat wave, temperatures not the only threat: expert
Spain has just emerged from a 21-day heat wave that engulfed Madrid, Barcelona and Zaragoza, posing a health threat which extends far beyond the actual temperature, according to Julio Diaz, a researcher at Madrid's Carlos III Health Institute......»»
Banshee Stealer malware haunts browser extensions on macOS
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»
Google’s threat team confirms Iran targeting Trump, Biden, and Harris campaigns
Another Big Tech firm seems to confirm Trump adviser Roger Stone was hacked. Enlarge / Roger Stone, former adviser to Donald Trump's presidential campaign, center, during the Republican National Convention (RNC) in Milwaukee on J.....»»
DDoS attack volume rises, peak power reaches 1.7 Tbps
The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore. Peak attack power rose from 1.6 terabits per second (Tbps) in H2 2023 to 1.7 Tbps. DDoS attacks hit Gaming, tech, fi.....»»
Teacup teaser: Yvonne Strahovski faces deadly threat in Peacock’s sci-fi horror series
Something terrifying is lurking in the new teaser for Teacup, Peacock's sci-fi horror series arriving this fall......»»
Breaking down online shopping"s silent threat
Breaking down online shopping"s silent threat.....»»
IntelOwl: Open-source threat intelligence management
IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a.....»»
Current attacks, targets, and other threat landscape trends
In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. Whil.....»»
Cybersecurity jobs available right now: August 14, 2024
Cloud Security Specialist EPAM Systems | Chile | Remote – View job details As a Cloud Security Specialist, you will be responsible for creating and maintaining security policies and assisting in the implementation and automation of se.....»»
Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine Memor.....»»
Australian gold mining company hit with ransomware
Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. .....»»
Slow Horses season 4 trailer: Jackson Lamb and Slough House tackle new threat
Jackson Lamb and his team of rejects are thrust into a new mission in the trailer for Apple TV+'s Slow Horses season 4......»»
"Killer robots" are becoming a real threat in Africa
The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. In April, for example, Al Qaeda's affiliate in the Sahel, Jama'at Nusrat al Isl.....»»
Browser backdoors: Securing the new frontline of shadow IT
Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger attack su.....»»
A major Sonos exploit was explained at Black Hat — but you needn’t worry
Researchers from NCC Group showed how a Sonos One could fall victim to an attack that would let someone listen in on the microphones......»»
Scout Suite: Open-source cloud security auditing tool
Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments. By leveraging the APIs provided by cloud vendors, Scout Suite collects and organizes configuration data, making it easier.....»»
Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"
Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»
New infosec products of the week: August 9, 2024
Here’s a look at the most interesting products from the past week, featuring releases from: Rapid7, AppOmni, Contrast Security, Elastic, Cequence Security, Veza, ArmorCode, and EndorLabs. Rapid7 releases Command Platform, unified attack defense and.....»»
A critical security issue in 1Password for Mac left credentials vulnerable to attack
1Password has disclosed a now patched critical security flaw in its software that could give attackers access to users' unlock keys and credentials. Here's what to do to keep your data safe.1Password has disclosed a critical security flaw present in.....»»