More PyPl packages hacked following phishing attack
Package maintainers gave away login credentials, which were then used to taint packages with malicious code......»»
Russia jails officer for buying wrong hardware to protect Crimean bridge from Ukrainian attack - TASS
Russia jails officer for buying wrong hardware to protect Crimean bridge from Ukrainian attack - TASS.....»»
Lush confirms it was hit by a cyberattack - but it isn"t saying much else
The company isn't sharing any details just yet, but some reports are speculating it suffered a ransomware attack......»»
Last letters from young kamikaze pilots provide rare insights into Japan’s feared special attack unit
Last letters from young kamikaze pilots provide rare insights into Japan’s feared special attack unit.....»»
Flipping the BEC funnel: Phishing in the age of GenAI
For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the bait. Over time, however, as s.....»»
Iran identifies alleged bomb-maker behind last week"s IS twin suicide attack that killed dozens
Iran identifies alleged bomb-maker behind last week"s IS twin suicide attack that killed dozens.....»»
Florida woman who kept baby after alleged Lyft driver sex attack says "blessing" came from "darkest hour"
Florida woman who kept baby after alleged Lyft driver sex attack says "blessing" came from "darkest hour".....»»
Apple AirDrop leaks user data like a sieve. Chinese authorities say they’re scooping it up.
Chinese authorities are exploiting a weakness Apple has allowed to go unfixed for 5 years. Enlarge (credit: Aurich Lawson | Getty Images) Chinese authorities recently said they're using an advanced encryption attack to d.....»»
New infosec products of the week: January 12, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Critical Start, Dasera, ID R&D, and SpecterOps. SpecterOps adds new Attack Paths to BloodHound Enterprise SpecterOps announced updates to BloodHound Enterpri.....»»
Researchers look at thermal stabilization in photonic packages
Photonics offers various advantages, including enablement of high-speed and low-loss communication by leveraging light properties in optical data communication, biomedical applications, automotive technology, and artificial intelligence domains. Thes.....»»
SEC’s X account hacked to post fake news of Bitcoin ETF approval
Someone has hijacked the X (formerly Twitter) account of the US Securities and Exchange Commission (SEC), and posted an announcement saying the agency has decided to allow the listing of Bitcoin ETFs (exchange-traded funds) on registered national sec.....»»
Linux devices are under attack by a never-before-seen worm
Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices. Enlarge (credit: Getty Images) For the past year, previously unknown self-replicating malware has been compromising Linux dev.....»»
SEC says X account was hacked as false post causes bitcoin price swings
X says hacker had control over phone number associated with SEC account. Enlarge (credit: Getty Images | Chesnot ) The Securities and Exchange Commission's X account was hacked yesterday and briefly displayed a post fals.....»»
SpecterOps adds new Attack Paths to BloodHound Enterprise
SpecterOps announced updates to BloodHound Enterprise (BHE) that add new Attack Paths focused on Active Directory Certificate Services (ADCS). These updates make BHE the most advanced tool on the market today for securing ADCS. ADCS is the Public Key.....»»
Network-connected wrenches in factories can be hacked for sabotage or ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»
Canonical wants better Snap support outside Ubuntu, based on latest hires
Returning developer says he might get to "change some of the old ideas." Enlarge (credit: Canonical/Ubuntu) Snaps, the self-contained application packages that Ubuntu has long seen as a simpler app store and a potential.....»»
GoalZero reveals three new portable power stations and a fridge at CES
The GoalZero Yeti 300, 500, and 700 each offer high-wattage outputs in tiny portable packages, plus there's a GoalZero fridge at CES 2024.Yeti 300GoalZero offers a variety of portable power stations across many price points. The latest Yeti 300, 500,.....»»
Uncovering the hidden dangers of email-based attacks
Email-based attacks have evolved beyond traditional spam and phishing attempts. Cybercriminals now employ sophisticated tactics such as spear-phishing, whaling, and business email compromise (BEC), posing a significant threat to businesses of all siz.....»»
Elon Musk drops price of X gold checks amid rampant crypto scams
Reports come the same week X reduced the cost of buying gold checkmarks. Enlarge (credit: ALAIN JOCARD / Contributor | AFP) There's currently a surge in cryptocurrency and phishing scams proliferating on X (formerly Twit.....»»
Breaking down the state of authentication
In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39% indicated phishing is the most feared cyberattack, while.....»»
Google"s security firm Mandiant has its Twitter account hacked
Hackers took over Mandiant’s X account to share crypto-draining links in a pretty ironic attack......»»