More PyPl packages hacked following phishing attack
Package maintainers gave away login credentials, which were then used to taint packages with malicious code......»»
Ars Technica used in malware campaign with never-before-seen obfuscation
Vimeo also used by legitimate user who posted booby-trapped content. Enlarge (credit: Getty Images) Ars Technica was recently used to serve second-stage malware in a campaign that used a never-before-seen attack chain to.....»»
In major gaffe, hacked Microsoft test account was assigned admin privileges
How does a legacy test account grant access to read every Office 365 account? Enlarge The hackers who recently broke into Microsoft’s network and monitored top executives’ email for two months did so by gaining acce.....»»
The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE
Hacks by Kremlin-backed group continue to hit hard. Enlarge (credit: Getty Images) Hewlett Packard Enterprise (HPE) said Wednesday that Kremlin-backed actors hacked into the email accounts of its security personnel and o.....»»
Russian hackers breached Microsoft, HPE corporate maliboxes
Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and Hewlett Packard Enterprise (HPE) have recently disclosed successful attack campaigns by the Russia-affiliated APT group. The Micro.....»»
1Kosmos BlockID 1Key secures users in restricted environments
1Kosmos announced BlockID 1Key, a biometric security key to provide a phishing-resistant passwordless multi-factor authentication option for Sensitive Compartmented Information Facilities (SCIF), manufacturing clean rooms, customer help desks, higher.....»»
iPhone 15"s Ceramic Shield survives bird attack in new ad
Apple's latest ad is "Swoop," a 30-second spot promoting the durability of the iPhone 15 because of its Ceramic Shield glass covering.Still from Apple's new "Swoop" adLike a stylized remake of Daphne du Maurier and Alfred Hitchcock's "The Birds," the.....»»
Automated Emulation: Open-source breach and attack simulation lab
Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution automatically constructs the following resources hosted on AWS: One Linux server deploying Caldera, P.....»»
45% of critical CVEs left unpatched in 2023
Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening, with 45% of critical CVEs remaining unpatched. Utilities (over 200% increase) and manufacturing (165% incre.....»»
Venafi Stop Unauthorized Code Solution reduces attack surface
Venafi introduced its new Stop Unauthorized Code Solution, designed to help security teams proactively prevent unauthorized code across any operating environment. By leveraging the combined power of Venafi’s CodeSign Protect product, trusted team o.....»»
Passkey support rolls out for the X iOS app
After the SEC's X account was hacked, the company quickly implemented passkey support for improved account security.X on the App StorePasskeys are a relatively new standard implemented by Apple, Google, and Microsoft in partnership with the FIDO Alli.....»»
Trello data breach of 15M accounts; Loan Depot 16M customers
A reported Trello data breach has seen the personal details of more than 15 million users put up for sale on the dark web. A separate Loan Depot ransomware attack resulted in more than 16 million customer accounts compromised, taking a number of t.....»»
Tietoevry ransomware attack halts Swedish organizations
Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack w.....»»
CloudFoxable: Open-source AWS penetration testing playground
CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts ai.....»»
Researchers discover rare phages that attack dormant bacteria
In nature, most bacteria live on the bare minimum. If they experience nutrient deficiency or stress, they shut down their metabolism in a controlled manner and go into a resting state. In this stand-by mode, certain metabolic processes still take pla.....»»
Watch NBA, NFL, and more: Get 50% off a month of live TV with Sling
Will you take the Orange Sling or the Blue Sling? Both live TV packages are 50% off right now......»»
Vercara UltraSecure offers protection from malicious attacks
Vercara is introducing UltraSecure bundles designed to meet the online security needs of mid-size companies. These flexible packages offer enterprise-grade, custom solutions that protect critical applications, secure online properties and increase we.....»»
FCC chair defends broadband discounts for poor people against Republican attack
Lawmakers criticized FCC for something that was decided by Congress, chair says. Enlarge / FCC Chairwoman Jessica Rosenworcel at a Senate subcommittee hearing on September 19, 2023 in Washington, DC. (credit: Getty Images | The.....»»
Millions of iPhones and MacBooks have this security flaw, and there’s nothing you can do
Virtually every electronic device is capable of being hacked, including Apple’s. To that point, Trail of Bits recently discovered a new attack through a GPU … The post Millions of iPhones and MacBooks have this security flaw, and there.....»»
New attack steals AI secrets from GPUs made by Apple, AMD, and Qualcomm
Patching all affected devices, which include some Macs and iPhones, may be tough. Enlarge (credit: MEHAU KULYK/Getty Images) As more companies ramp up development of artificial intelligence systems, they are increasingly.....»»
Living Security Unify Power Insights identifies vulnerable members within an organization
Living Security announced Unify Power Insights, which combines intelligence across multiple identity management and security tools to pinpoint visibility into which members of the workforce are most vulnerable to phishing, account compromise, malware.....»»