Attack worm may be new biocontrol weapon against wasp
A strain of roundworm discovered for the first time in Australian pine plantations during University of the Sunshine Coast-led research could become the timber industry's latest biocontrol weapon......»»
MOVEit hack: BBC, BA and Boots among cyber attack victims
Staff at multiple organisations are warned of a payroll data breach after an IT supplier is hacked......»»
Surveilling your employees? You could be putting your company at risk of attack
Are you watching your employees? Though the question may incite thoughts of “Big Brother” and an all-seeing or all-knowing entity, it isn’t quite as ominous as you might think. Employee productivity surveillance technology, or EPST, often t.....»»
Cybercriminals use legitimate websites to obfuscate malicious payloads
According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The evolution of phishing emails continues to pose a major threat to organizations, emphasizing the.....»»
Zero-click iOS malware attack through iMessage is actively infecting iPhones
Antivirus provider Kaspersky has discovered a malware campaign explicitly aimed at infecting iPhones running up to iOS 15.7 through iMessage — but it can be found and prevented.iOS devices have been specifically targeted with malwareKaspersky's tea.....»»
Zyxel firewalls under attack by Mirai-like botnet
CVE-2023-28771, the critical command injection vulnerability affecting many Zyxel firewalls, is being actively exploited by a Mirai-like botnet, and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. About CVE-2023-28771 CV.....»»
Bitdefender GravityZone Security for Mobile provides protection against mobile attack vectors
Bitdefender unveiled GravityZone Security for Mobile, designed to provide organizations with advanced Mobile Threat Detection (MTD) and security for Android, iOS and Chromebook devices, including Chrome extensions. The new offering helps enterprises,.....»»
ConnectSecure enhances its cybersecurity platform with deep attack surface scanning and EPSS
ConnectSecure is adding deep attack surface scanning and the Exploit Prediction Scoring System (EPSS) to its cybersecurity platform for managed service providers (MSPs) that protect small and midsize businesses. The new capabilities will be fully int.....»»
Someone is roping Apache NiFi servers into a cryptomining botnet
If you’re running an Apache NiFi instance exposed on the internet and you have not secured access to it, the underlying host may already be covertly cryptomining on someone else’s behalf. The attack Indicators of the ongoing campaign were.....»»
Organizations spend 100 hours battling post-delivery email threats
Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections, stolen data, and reputational damage, according to Barracuda Networks. Barracuda Networks research finds 24% of orga.....»»
Generative AI: The new attack vector for trust and safety
Threat actors are abusing generative AI to carry out child sex abuse material (CSAM), disinformation, fraud and extremism, according to ActiveFence. “The explosion of generative AI has far-reaching implications for all corners of the internet,&.....»»
AI becomes the not-so-secret weapon behind new rounds of chip competition
News about significant improvements in yields and capacity on Samsung's 4nm process and the subsequent win in getting orders from AMD and Google raised some eyebrows among its competitors. How did Samsung make such a huge leap in such a short time? O.....»»
We Need 50 More Years of the Clean Water Act
The Clean Water Act, a bipartisan piece of legislation that has fundamentally changed water pollution in the U.S., is under attack when it should be strengthened instead.....»»
Turn this Warzone 2.0 rifle into a powerhouse with one easy trick
One weapon is leaps and bounds better than the rest in Warzone 2.0. Here's the best way to use it......»»
Phishing campaign targets ChatGPT users
A clever phishing campaign aimed at stealing users’ business email account credentials by impersonating OpenAI, the company behind the ChatGPT chatbot, has been spotted by Inky researchers. The attack ChatGPT has quickly gained popularity and i.....»»
Chinese state hackers infect critical infrastructure throughout the US and Guam
Group uses living-off-the-land attack and infected routers to remain undetected. Enlarge (credit: peterschreiber.media | Getty Images) A Chinese government hacking group has acquired a significant foothold inside critica.....»»
Puzzling rings may be finger loops from prehistoric weapon systems, research finds
When most researchers looked at a puzzling group of artifacts discovered at French archaeological sites, they presumed these to be ornaments or clothing. But Justin Garnett saw something else......»»
This new Photoshop tool could bring AI magic to your images
Adobe has introduced a new AI tool to Photoshop that could revolutionize how you edit all your images. But will it be a potent misinformation weapon too?.....»»
Auto supplier Gentex hit by ransomware attack
Company says it "is aware of the data breach that occurred several months ago, and we have communicated to all affected parties. It's important to note that the breach has not had an impact on our operations.".....»»
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
BrutePrint requires just $15 of equipment and a little amount of time with a phone. Enlarge (credit: Getty Images) Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to.....»»
Blacklist untrustworthy apps that peek behind your firewall
With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due to data privacy concerns, Montana has passed the first bill in the United States to ban TikTok. Previously, India has banned 59.....»»