Moths use acoustic decoys to dodge bat attacks
In dark skies around the world there unfolds a nightly battle between bats and the nocturnal insects upon which they feast. You'd have thought bats, equipped as they are with echolocation, in which they navigate using sound, would have no trouble gob.....»»
Reintroduced wolves kill four yearling cattle in latest of string of livestock attacks in Colorado
Wolves killed several yearling cattle in north-central Colorado this week, bringing the total number of wolf kills of livestock this month to six......»»
LastPass users targeted in phishing attacks good enough to trick even the savvy
Campaign used email, SMS, and voice calls to trick targets into divulging master passwords. Enlarge (credit: Getty Images) Password-manager LastPass users were recently targeted by a convincing phishing campaign that use.....»»
Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
While it initially seemed that protecting Palo Alto Network firewalls from attacks leveraging CVE-2024-3400 would be possible by disabling the devices’ telemetry, it has now been confirmed that this mitigation is ineffectual. “Device tele.....»»
Attackers are pummeling networks around the world with millions of login attempts
Attacks coming from nearly 4,000 IP addresses take aim at VPNs, SSH and web apps. Enlarge (credit: Matejmo | Getty Images) Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s.....»»
Cisco Duo says a third-party data breach stole MFA SMS logs
Hackers stole Cisco Duo customers' phone numbers, and the company is warning of possible incoming smishing attacks......»»
New open-source project takeover attacks spotted, stymied
The OpenJS Foundation has headed off a “credible takeover attempt” similar to the one that resulted in a backdoor getting included in the open-source XZ Utils package by someone who called themselves “Jia Tan”. This malicious.....»»
Australian court is the latest to attack Apple on behalf of rich corporations
Apple Fellow Phil Schiller has been testifying in an Australian Federal Court about the origins of the App Store in 2008, and it's just the latest example of pointless attacks on the company.Phil Schiller (left) and Steve Jobs with the first online A.....»»
Stellantis clashes with suppliers spill into court, shut down plants
The maker of the Jeep, Chrysler, Dodge and Ram brands has taken a hard line toward parts makers seeking inflationary cost relief, rolling out a “no more claims” policy earlier this year......»»
Stellantis clashes with suppliers, spilling into court and shutting down plants
The maker of Jeep, Chrysler, Dodge and Ram brands has taken a hard line toward parts makers seeking inflationary cost relief, rolling out a “no more claims” policy earlier this year......»»
Geopolitical tensions escalate OT cyber attacks
In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomwar.....»»
CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks
Earlier today, Palo Alto Networks revealed that a critical command injection vulnerability (CVE-2024-3400) in the company’s firewalls has been exploited in limited attacks and has urged customers with vulnerable devices to quickly implement mit.....»»
Index Engines CyberSense 8.6 detects malicious activity
Index Engines announced the latest release of its CyberSense software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold Alerts to proactively detect unusual activ.....»»
Elon Musk denies knowing who’s suing him to dodge defamation suit
Musk failed to keep his most recent deposition hidden from the public. Enlarge (credit: NurPhoto / Contributor | NurPhoto) After Elon Musk was accused of defaming Ben Brody—a 22-year-old Jewish man falsely linked to a.....»»
Akamai Shield NS53 protects on-prem and hybrid DNS infrastructure
Akamai launched Akamai Shield NS53, a product that protects on-premises (on-prem) Domain Name System (DNS) infrastructure from resource exhaustion attacks. These attacks overwhelm servers to the point that they can no longer respond to valid DNS quer.....»»
How can the energy sector bolster its resilience to ransomware attacks?
Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this industry have grown significantly in recent years, as geopolitical tensions h.....»»
Threat actors are raising the bar for cyber attacks
From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, applications, and user behavior. The consequences of successful cyber attacks can.....»»
Week in review: 73M customers affected by AT&T data leak, errors led to US govt inboxes compromise
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cyber attacks on critical infrastructure show advanced tactics and new capabilities In this Help Net Security interview, Marty Edwards, Deputy CTO O.....»»
Healthcare’s cyber resilience under siege as attacks multiply
In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of emplo.....»»
Strengthening defenses against nation-state and for-profit cyber attacks
There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of Xage Security, discusses the steps enterprises and critical infrastructure mus.....»»
Cyber attacks on critical infrastructure show advanced tactics and new capabilities
In this Help Net Security interview, Marty Edwards, Deputy CTO OT/IoT at Tenable, discusses the impact of geopolitical tensions on cyber attacks targeting critical infrastructure. Edwards highlights the need for collaborative efforts between policyma.....»»