Cyber criminals publish more than 4,000 stolen Sepa files
Thousands of files hacked from Scotland's environment watchdog appear on the "dark web" after it rejected a ransom demand......»»
Ordr launches OrdrAI CAASM+ to provide asset visibility with AI/ML classification
Ordr has launched its new OrdrAI CAASM+ (Cyber Asset Attack Surface Management) product, built on top of the OrdrAI Asset Intelligence Platform. For years, Ordr has been solving asset visibility and security challenges in the world’s most deman.....»»
New macOS Sonoma 14.4 bug kills file versions in iCloud Drive
The list of issues in macOS Sonoma 14.4 is continuing to grow, with a new bug uncovered that wipes saved versions of files stored on iCloud Drive.A new macOS Sonoma 14.4 bug breaks iCloud Drive file versionsMany apps offer the capability to save earl.....»»
Outsmarting cybercriminal innovation with strategies for enterprise resilience
In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a con.....»»
Scientists publish novel research on how individual cells respond to viral infection
A team of scientists from Montana State University recently published unique research examining how individual cells respond to viral infection. The work used state-of-the-art technology to culture cells and track infection in real time; it is the fi.....»»
Why cyber recruitment needs a rapid overhaul
Why cyber recruitment needs a rapid overhaul.....»»
Deloitte unveils CyberSphere platform for simplified cyber program management
Deloitte has launched CyberSphere, a vendor-neutral services and solutions platform to help clients simplify their organizations’ cyber program data, workflows, reporting and third-party technologies for improved cyber operational efficiency an.....»»
Public anxiety mounts over critical infrastructure resilience to cyber attacks
With temporary failures of critical infrastructure on the rise in the recent years, 81% of US residents are worried about how secure critical infrastructure may be, according to MITRE and The Harris Poll. Public views cyberattacks as greatest risk to.....»»
Google Drive could add a smart new way to keep your files organized
Google Drive could be adding a new feature similar to the labels system available to Workspace users......»»
Human risk factors remain outside of cybersecurity pros’ control
Cyber threats are growing at an unprecedented pace, and the year ahead is fraught with cybercrime and incidents anticipated ahead of the busy election year where over 50 countries head to the polls, according to Mimecast. With new threats like AI and.....»»
Key MITRE ATT&CK techniques used by cyber attackers
While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITR.....»»
Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788)
A recently fixed SQL injection vulnerability (CVE-2023-48788) in Fortinet’s FortiClient Endpoint Management Server (EMS) solution has apparently piqued the interest of many: Horizon3’s Attack Team means to publish technical details and a.....»»
PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files to the underlying Windows system. Tenable researchers have published a PoC.....»»
Stellar Cyber and Torq join forces to deliver automation-driven security operations platform
Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the power of Stellar Cyber Open XDR with Torq Hyperautomation, providing securi.....»»
AirTag & police save builder from massive stolen car replacement expense
A worksman left his car keys on the dash, and the vehicle was promptly stolen. Apple's AirTag came to the rescue.Builder Paul Conway from Leeds in England has told local news site Leeds Live that at Christmas, his wife had bought a four-pack of AirTa.....»»
Meta sues “brazenly disloyal” former exec over stolen confidential docs
Meta's former exec allegedly shared data center secrets with a shadowy startup. Enlarge (credit: Boris Zhitkov | Moment) A recently unsealed court filing has revealed that Meta has sued a former senior employee for "braz.....»»
Stanford University says data of thousands was stolen in ransomware attack
Some 27,000 people have had their data stolen, including Social Security numbers and government ID data......»»
Nozomi Networks raises $100 million to help secure critical infrastructure
Nozomi Networks announced a $100 million Series E funding round to help accelerate innovative cyber defenses and expand cost-efficient go-to-market expansion globally. This latest round includes investments from Mitsubishi Electric and Schneider Elec.....»»
Keyloggers, spyware, and stealers dominate SMB malware detections
In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, e.....»»
Image-scraping Midjourney bans rival AI firm for scraping images
Midjourney pins blame for 24-hour outage on "bot-net like" activity from Stability AI employee. Enlarge / A burglar with a flashlight and papers in a business office—exactly like scraping files from Discord. (credit: Getty Imag.....»»
Microsoft: Russian hackers accessed internal systems, code repositories
Midnight Blizzard (aka APT29), a group of Russian hackers tied to the country’s Foreign Intelligence Service (SVR), has leveraged information stolen from Microsoft corporate email systems to burrow into the company’s source code repositor.....»»