Hackers are exploiting a Pulse Secure 0-day to breach orgs around the world
Exploits allow state-backed hackers to bypass 2FA and breach defense contractors. Enlarge (credit: CHUYN / Getty Images) Hackers backed by nation-states are exploiting critical vulnerabilities in the Pulse Secure VPN to bypass two-factor authe.....»»
Edgio Client-Side Protection enables organizations to secure critical customer data
Edgio released its Client-Side Protection solution. Designed to monitor scripts and APIs on the browser-side to prevent malicious code from exfiltrating sensitive customer data, Edgio Client-Side Protection allows teams to gain full visibility on cli.....»»
CISOs are nervous Gen AI use could lead to more security breaches
Malicious Gen AI use is on top of everyone's mind, as hackers create convincing phishing emails......»»
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco T.....»»
Google can’t quit third-party cookies—delays shut down for a third time
Google says UK regulator testing means the advertising tech will last until 2025. Enlarge (credit: Getty Images) Will Chrome, the world's most popular browser, ever kill third-party cookies? Apple and Mozilla both killed.....»»
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks? Enlarge (credit: Getty Images) Hackers backed by a powerful nation-state have been exploiting two zero-day vulnerabilities in Ci.....»»
Team reports on relationship between contents of diosgenin and brassinosteroids in Dioscorea zingiberensis
Diosgenin, a secondary metabolite isolated from the Dioscorea spp. plant family, is an irreplaceable and ideal starting material for the synthesis of steroid hormone drugs. Dioscorea zingiberensis is the world's most desirable and important plant sou.....»»
Hackers are using developing countries for ransomware practice
Businesses in Africa, Asia, and South America hit before moving on to Western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and Sout.....»»
Hidden biosphere discovered beneath world"s driest hot desert
In a finding with implications for the search for extraterrestrial life, researchers have discovered microbial life 13 feet below Earth's most inhospitable desert. The research is published in the journal PNAS Nexus......»»
Tubi teams with DAZN for sports as free TV service continues its takeover
Women's soccer from across the world is headed to Tubi, thanks to a partnership with streaming service DAZN......»»
Apple @ Work: Over 52% of workers try to memorize and reuse the same password across multiple apps at work
Apple @ Work is brought to you by Kolide by 1Password, the device trust solution that ensures that if a device isn’t secure, it can’t access your apps. Close the Zero Trust access gap for Okta. Learn more or watch the demo. World Password Da.....»»
Hackers are carrying out ransomware experiments in developing countries
Businesses in Africa, Asia, and South America hit before moving on to western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia and South.....»»
Vroom CEO: ‘Gut-wrenching" decision to end online used-car business
When a search to secure more capital was unsuccessful, Vroom's senior leadership called it: The company would stop buying and selling used vehicles online as soon as possible......»»
Secureworks enables users to view known vulnerabilities in the context of threat data
Secureworks announced the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration be.....»»
Is the Arm version of Windows ready for its close-up?
Checking back in with Windows 11 on Arm on the eve of the Snapdragon X Elite. Enlarge (credit: Qualcomm) Signs point to Qualcomm’s Snapdragon X Elite processors showing up in actual, real-world, human-purchasable compu.....»»
Photos: GISEC Global 2024
GISEC Global is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. Here are a few photos from the event, featured vendors include: Waterfall Security Solutions, Netskope, Google Cloud, Huawei, NetSPI, SecureLink, Cloudflar.....»»
GISEC Global 2024 video walkthrough
In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features the following vendors: Sophos, Waterfall Security Solutions, UAE Cyber Securi.....»»
HMD Pulse Briefly Appears in Store Listing
Online retailer Gigantti briefly listed the HMD Pulse seemingly ahead of its actual launch schedule. The post HMD Pulse Briefly Appears in Store Listing appeared first on Phandroid. In case you’re curious about HMD Global’s fir.....»»
Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
For nearly four years and perhaps even longer, Forest Blizzard (aka Fancy Bear, aka APT28) has been using a custom tool that exploits a specific vulnerability in Windows Print Spooler service (CVE-2022-38028). Dubbed GooseEgg, the tool is a launcher.....»»
Hackers infect users of antivirus service that delivered updates over HTTP
eScan AV updates were delivered over HTTP for five years. Enlarge (credit: Getty Images) Hackers abused an antivirus service for five years in order to infect end users with malware. The attack worked because the service.....»»
2 former dealership employees who started new marketing firm settle lawsuit
A Massachusetts dealership has settled a lawsuit that accused two former employees of breach of loyalty, misappropriation of trade secrets and other claims for setting up a competing dealer-to-dealer digital marketing agency......»»