More PyPl packages hacked following phishing attack
Package maintainers gave away login credentials, which were then used to taint packages with malicious code......»»
Banshee Stealer malware haunts browser extensions on macOS
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»
Google’s threat team confirms Iran targeting Trump, Biden, and Harris campaigns
Another Big Tech firm seems to confirm Trump adviser Roger Stone was hacked. Enlarge / Roger Stone, former adviser to Donald Trump's presidential campaign, center, during the Republican National Convention (RNC) in Milwaukee on J.....»»
DDoS attack volume rises, peak power reaches 1.7 Tbps
The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore. Peak attack power rose from 1.6 terabits per second (Tbps) in H2 2023 to 1.7 Tbps. DDoS attacks hit Gaming, tech, fi.....»»
Chromatin structure found to play a key role in canine social behavior evolution
A study on dogs found that chromatin's spatial structure has a significant role in the evolution of social behavior. Chromatin, the compact form of DNA, not only packages genetic material but also plays a crucial role in gene regulation......»»
Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine Memor.....»»
Australian gold mining company hit with ransomware
Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. .....»»
Browser backdoors: Securing the new frontline of shadow IT
Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger attack su.....»»
A major Sonos exploit was explained at Black Hat — but you needn’t worry
Researchers from NCC Group showed how a Sonos One could fall victim to an attack that would let someone listen in on the microphones......»»
Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"
Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»
New infosec products of the week: August 9, 2024
Here’s a look at the most interesting products from the past week, featuring releases from: Rapid7, AppOmni, Contrast Security, Elastic, Cequence Security, Veza, ArmorCode, and EndorLabs. Rapid7 releases Command Platform, unified attack defense and.....»»
A critical security issue in 1Password for Mac left credentials vulnerable to attack
1Password has disclosed a now patched critical security flaw in its software that could give attackers access to users' unlock keys and credentials. Here's what to do to keep your data safe.1Password has disclosed a critical security flaw present in.....»»
Prompt injection attack on Apple Intelligence reveals a flaw, but is easy to fix
A prompt injection attack on Apple Intelligence reveals that it is fairly well protected from misuse, but the current beta version does have one security flaw which can be exploited. However, the issue would be very easy for the company to fix, so.....»»
“Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
A researcher has developed a downgrade attack that can make Windows machines covertly, persistently and irreversibly vulnerable, even if they were fully patched before that. A downgrade attack exploiting the Windows Update process The direction of Sa.....»»
Microsoft 365 anti-phishing alert “erased” with one simple trick
Attackers looking for a way into organizations using Microsoft 365 can make an alert identifying unsolicited (and thus potential phishing) emails “disappear”. “When an Outlook user receives an e-mail from an address they don’t typ.....»»
Austria finds chemicals in house of suspected Taylor Swift concert attack plotter
Austria finds chemicals in house of suspected Taylor Swift concert attack plotter.....»»
Russian Mi-28 Havoc Attack Helicopter Engaged In Mid-Air By Ukrainian Drone
Russian Mi-28 Havoc Attack Helicopter Engaged In Mid-Air By Ukrainian Drone.....»»
3 billion records leaked online in one of the biggest breaches ever
The year of record-breaking data breaches continues unabated as public records data provider National Public Data has reportedly been hacked. According to HackRead.com, a hacker … The post 3 billion records leaked online in one of the biggest b.....»»
Videos of people feeding crocodiles at site of latest attack are deeply concerning, says expert
After a 4.9-meter saltwater crocodile (Crocodylus porosus) killed a 40-year-old doctor in Far North Queensland this week, the illegal feeding of wild crocodiles has become a point of major concern......»»
Leaving passwords behind and developing phishing-resistant users
Leaving passwords behind and developing phishing-resistant users.....»»
Cymulate AI Copilot validates security against real-time threats
Cymulate AI Copilot is a generative AI solution designed to deploy, test and tune security controls to evaluate their effectiveness against real-time threats. The solution offers a dynamic attack planner, among other AI-powered features, for greater.....»»