Kaseya acquires decryption key "from trusted third party" after ransomware attack
Kaseya, the Miami-based software company at the centre of a ransomware attack which affected thousands of other businesses, says it has "obtained a decryptor" to unlock the victims' systems......»»
Cybercrime stats you can’t ignore
In this article, you will find excerpts from various reports that offer stats and insights about the current cybercrime landscape. Behavioral patterns of ransomware groups are changing GuidePoint Security | GRIT Q1 2024 Ransomware Report |.....»»
Novel attack against virtually all VPN apps neuters their entire purpose
TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Enlarge (credit: Getty Images) Researchers have devised an attack against nearly all virtual private network applications that forc.....»»
Security Bite: Here’s what malware your Mac can detect and remove
Ever wonder what malware macOS can detect and remove without help from third-party software? Apple continuously adds new malware detection rules to Mac’s built-in XProtect suite. While most of the rule names (signatures) are obfuscated, with a bit.....»»
BlackBasta claims Synlab attack, leaks some stolen documents
The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of operations at Synlab Italia. The group claimed the attack on their leak site on Saturday and says they have exfiltrated appr.....»»
Boaters dumping trash in South Florida"s waters? Teens face felony charges
Two teen boaters are facing felony charges for pollution after they were caught on video dumping trash into the Atlantic Ocean during a South Florida boating party......»»
Google tells court it shouldn’t have to distribute third-party app stores
Google: Epic Games wants court to "micromanage" Android app distribution. Enlarge (credit: Getty Images | Kirill Kudryavtsev) Google urged a federal court to reject Epic Games' request for an injunction that would reduce.....»»
New infosec products of the week: May 3, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Cybersixgill, Proofpoint, Secure Code Warrior, Snyk, and Synopsys. Cybersixgill Third-Party Intelligence module identifies potential supply chain ri.....»»
Edgio ASM reduces risk from web application vulnerabilities
Edgio launched its Attack Surface Management (ASM) solution. ASM is designed to discover all web assets, provide full inventory of technologies, detect security exposures and manage exposure response across an organization from a centralized manageme.....»»
How transcripts in Apple Podcasts became a time-saving killer feature
There is no shortage of great third-party podcast clients on the App Store, such as Castro, Overcast, and Pocket Casts. But when Apple Podcasts introduced transcripts in iOS 17.4, the app immediately won me over. Podcast transcripts are a fantasti.....»»
Sideloading, third-party browser engines, and more are coming to the iPad in the EU this year
Earlier this week, the European Commission announced that iPadOS is now designated as a gatekeeper platform in the European Union, just like the iPhone and the App Store. In a new developer announcement today, Apple acknowledged this change and co.....»»
Apple won"t fight EU over iPad gatekeeper status, third-party App Stores coming
Despite the EU claiming that the iPad qualifies under its Digital Markets Act as a gatekeeper when it does not yet, Apple has announced that it will comply regardless.The EU is treating the iPad as a gatekeeper platform under its Digital Markets ActE.....»»
Bose has a bigger Bluetooth speaker to power your next pool party
Bose takes its popular SoundLink Flex and adds more muscle, as well as stereo sound, to create the SoundLink Max......»»
Snyk AppRisk Pro leverages AI and third-party integrations for faster risk mitigation
Snyk has released Snyk AppRisk Pro, pairing artificial intelligence (AI) with application context from third-party integrations to help application security (AppSec) and development teams address business-critical risk and accelerate fixes. Snyk AppR.....»»
Virsec releases security tools to offer ransomware protection
Virsec released TrustSight and TrustGuardian, its newest security tools in the fight against an ever-expanding threat environment – one where EDRs miss up to 30% of attacks, and ransomware detonates in milliseconds, according to various sources.....»»
AI-driven phishing attacks deceive even the most aware users
Vishing and deepfake phishing attacks are on the rise as attackers leverage GenAI to amplify social engineering tactics, according to Zscaler. AI automates and personalizes various aspects of the attack process AI-driven phishing attacks leverage AI.....»»
Health care giant comes clean about recent hack and paid ransom
Ransomware attack on the $371 billion company hamstrung US prescription market. Enlarge (credit: Getty Images) Change Healthcare, the health care services provider that recently experienced a ransomware attack that hamst.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
Account compromise of “unprecedented scale” uses everyday home devices
Credential-stuffing attack uses proxies to hide bad behavior. Enlarge (credit: Getty Images) Authentication service Okta is warning about the “unprecedented scale” of an ongoing campaign that routes fraudulent login.....»»
Jackbox Naughty Pack is the M-rated party game you’ve been waiting for
In lieu of a new Jackbox Party Pack game this year, we'll be getting a mature-rated Jackbox Naughty Pack......»»
iPhone web browser choice gets one thing right, two things wrong, say developers
Being prompted to make an iPhone web browser choice in Europe has seen an uptick in the use of third-party apps, but not everyone is happy about it. The EU itself is investigating whether Apple’s implementation of the antitrust requirement goes.....»»