New persistent backdoor used in attacks on Barracuda ESG appliances
The Cybersecurity and Infrastructure Agency (CISA) has published an analysis report on the backdoors dropped by attackers exploiting CVE-2023-2868, a remote command injection vulnerability in Barracuda Email Security Gateway (ESG) appliances. Barracu.....»»
DOJ antitrust lawsuit complains that iPhones are cool, says lawyer
One element of the DOJ antitrust lawsuit against Apple addresses iMessage, and Apple’s decision to keep the app exclusive to iPhone. But it goes further than arguing that this is anti-competitive, and attacks the use of green chat bubbles for Andro.....»»
CISA: Here’s how you can foil DDoS attacks
In light of the rise of “DDoS hacktivism” and the recent DDoS attacks aimed at disrupting French and Alabama government websites, the Cybersecurity and Infrastructure Security Agency (CISA) has updated its guidance of how governmental ent.....»»
US DOJ attacks nearly every aspect of Apple"s business in massive antitrust suit
After years of complaints by competitors, and an equally-long investigation, the long-rumored antitrust suit against Apple has finally been filed by the US Department of Justice — and it is going after nearly every part of the company.Apple has bee.....»»
Malware stands out as the fastest-growing threat of 2024
93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite.....»»
Amazon’s Big Spring sale: Save on TVs, laptops, appliances, and more
The Amazon Big Spring sale is here! It's your chance to get deals on TVs, laptops, tablets, toys, tools, and much more. Come see......»»
A perfect storm: Assessing the deadly impact of climate-driven flooding and cyber attacks
Society is now in an era in which climate change and cyber insecurity are regular threats to life and property. In tandem, the two have the potential to be especially deadly......»»
Growing AceCryptor attacks in Europe
ESET Research has recorded a considerable increase in AceCryptor attacks, with detections tripling between the first and second halves of 2023. In recent months, researchers registered a significant change in how AceCryptor is used, namely that the a.....»»
API environments becoming hotspots for exploitation
A total of 29% of web attacks targeted APIs over 12 months (January through December 2023), indicating that APIs are a focus area for cybercriminals, according to Akamai. API integration amplifies risk exposure for enterprises APIs are at the heart o.....»»
Red teaming in the AI era
As AI gets baked into enterprise tech stacks, AI applications are becoming prime targets for cyber attacks. In response, many cybersecurity teams are adapting existing cybersecurity practices to mitigate these new threats. One such practice measure i.....»»
Researchers uncover culprits behind pitting corrosion in 3D-printed stainless steel
Like a hidden enemy, pitting corrosion attacks metal surfaces, making it difficult to detect and control. This type of corrosion, primarily caused by prolonged contact with seawater in nature, is especially problematic for naval vessels......»»
Appdome launches Social Engineering Prevention service to safeguard mobile users
Appdome has unveiled its new Social Engineering Prevention service on the Appdome platform. The new service enables mobile brands to continuously detect, block and intervene the moment social engineering attacks attempt to exploit user trust or manip.....»»
Public anxiety mounts over critical infrastructure resilience to cyber attacks
With temporary failures of critical infrastructure on the rise in the recent years, 81% of US residents are worried about how secure critical infrastructure may be, according to MITRE and The Harris Poll. Public views cyberattacks as greatest risk to.....»»
Rangers hunt endangered Indonesian tigers after deadly attacks
Indonesian rangers along with an animal whisperer are hunting multiple critically endangered Sumatran tigers after two villagers were recently killed in separate attacks that stoked local anger, officials said Thursday......»»
Stellar Cyber and Torq join forces to deliver automation-driven security operations platform
Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the power of Stellar Cyber Open XDR with Torq Hyperautomation, providing securi.....»»
Lidar sensors vulnerable to spoofing attacks, researchers say
Using a series of high-frequency laser pulses, researchers created a 10-square meter perception dead zone......»»
Gravity waves caused by complex terrain over the Tibetan Plateau can enhance the intensity of spring rainfall
The springtime persistent rainfall is the major rainy period before the onset of summer monsoon in East Asia. For example, it accounts for about 35% of the annual precipitation in South China, which brings plentiful water for agricultural and industr.....»»
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of.....»»
Political rage on social media is making us cynical: Study
Political anger and cynicism are rising in the United States and in many democracies worldwide, and both are associated with exposure to political attacks on social media, a new University of Michigan study shows......»»
Email security trends in the energy and infrastructure sector
In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security da.....»»
Microsoft says Kremlin-backed hackers accessed its source and internal systems
Midnight Blizzard is now using stolen secrets in follow-on attacks against customers. Enlarge (credit: Getty Images) Microsoft said that Kremlin-backed hackers stole its proprietary source code during a January breach of.....»»