Ransomware attacks on Linux to surge
Trend Micro predicted that ransomware groups will increasingly target Linux servers and embedded systems over the coming years. It recorded a double-digit year-on-year (YoY) increase in attacks on these systems in 1H 2022. Jon Clay, VP of threat inte.....»»
VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
Ransomware operators have been leveraging CVE-2024-37085, an authentication bypass vulnerability affecting Active Directory domain-joined VMware ESXi hypervisors, to gain full administrative access to them and encrypt their file system. VMware owner.....»»
Ransomware and email attacks are hitting businesses more than ever before
Misconfigured systems and poor MFA implementations are to blame, Cisco Talos report says......»»
AI-generated deepfake attacks force companies to reassess cybersecurity
As AI-generated deepfake attacks and identity fraud become more prevalent, companies are developing response plans to address these threats, according to GetApp. In fact, 73% of US respondents report that their organization has developed a deepfake r.....»»
Which operating system is safest to use?
Windows, macOS, Chrome OS, Linux -- which is the safest to use? Each have their strengths and weaknesses. Here's which we think is the most secure......»»
Imperfect Linux-powered DIY smart TV is the embodiment of ad fatigue
DIYer picks a "little insane"-looking setup for less tracking, more control. Enlarge (credit: Carl the Person/YouTube) Smart TV owners have been subjected to an increasing amount of ads and tracking. Ad fatigue, only wo.....»»
Imperfect, Linux-powered, DIY smart TV is the embodiment of ad fatigue
DIYer picks a "little insane"-looking setup for less tracking, more control. Enlarge (credit: Carl the Person/YouTube) Smart TV owners have been subjected to a growing amount of ads and tracking. Ad fatigue, only worsen.....»»
Nearly 90 percent of outside software rebooted after CDK cyberattacks, CEO Brian MacDonald says
CDK Global, working with outside experts, is continuing to investigate whether the June 19 ransomware event led to the theft of any personal information......»»
AI-powered optical detection to thwart counterfeit chips
The semiconductor industry has grown into a $500 billion global market over the last 60 years. However, it is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips, introducing substantial risks of malfunct.....»»
FTC attacks Microsoft’s post-merger Game Pass price increases
Regulator says move is "exactly the sort of consumer harm" it warned about. Enlarge / Access to first-party games on launch day remains a major selling point for the Xbox Game Pass Ultimate tier. (credit: Microsoft) The.....»»
One-third of dev professionals unfamiliar with secure coding practices
Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux Foundation. Despite this, many developers lack the essential knowledge and sk.....»»
Auto repossessions surge 23% in U.S. during first half of 2024 as Americans fall behind on payments
With high interest rates and inflation hitting household budgets, the spike in seizures provides a window into the average consumer’s financial health at a key time for policymakers......»»
DDoS attacks see a huge rise as criminals get braver and more ambitious
Hackers are getting access to better tools, previously only reserved for state-sponsored actors, researchers say......»»
Auto industry sees website satisfaction surge amid post-pandemic recovery
J.D. Power's website manufacturer satisfaction survey found that increased inventory, incentives and rebates have resulted in the highest overall satisfaction with car manufacturer websites since before the pandemic......»»
New tech helps find hidden details in whale, cassowary and other barely audible animal calls
Over the past few decades, animal sounds have seen a huge surge in research. Advances in recording equipment and analysis techniques have driven new insights into animal behavior, population distribution, taxonomy and anatomy......»»
Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with Tre.....»»
Rite Aid confirms data breach following ransomware attack
Pharmacy giant confirms sensitive data was stolen, but health and payment information was not......»»
In the South, sea level rise accelerates at some of the most extreme rates on Earth
The surge is startling scientists, amplifying impacts such as hurricane storm surges. Enlarge / Steve Salem is a 50-year boat captain who lives on a tributary of the St. Johns River. The rising tides in Jacksonville are testing h.....»»
Exim vulnerability affecting 1.5M servers lets attackers attach malicious files
Based on past attacks, it wouldn’t be surprising to see active targeting this time, too. Enlarge More than 1.5 million email servers are vulnerable to attacks that can deliver executable attachments to user accounts,.....»»
CDK CEO pledges to compensate dealers after ransomware event
CDK CEO Brian MacDonald promised to dealers in a letter that they would receive "some financial relief" for interruptions stemming from the June 19 cyberattacks......»»
Exim vulnerability affecting 1.5 million servers lets attackers attach malicious files
Based on past attacks, It wouldn’t be surprising to see active targeting this time too. Enlarge More than 1.5 million email servers are vulnerable to attacks that can deliver executable attachments to user accounts, s.....»»