Twitter sues hate-speech watchdog, following through on its litigation threat
Twitter has sued the Center for Countering Digital Hate (CCDH), a nonprofit group that has criticized the company's handling of hate speech, following through on a litigation threat that had been publicly revealed just hours before......»»
The changes in the cyber threat landscape in the last 12 months
When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat Assessment (.....»»
Child safety watchdog accuses Apple of hiding real CSAM figures
A child protection organization says it has found more cases of abuse images on Apple platforms in the UK than Apple has reported globally.Apple cancelled its major CSAM proposals but introduced features such as automatic blocking of nudity sent to c.....»»
Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver
ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET dubbed HotPage, comes self-contained in an executable file that installs its m.....»»
Washington DC among US cities most vulnerable to space weather, scientists say
Several cities in the United States—including the nation's capital—have power grids particularly vulnerable to the threat of space weather—but experts are still trying to understand why......»»
Elon Musk’s X tests letting users request Community Notes on bad posts
X to fight spiking disinformation by letting users request Community Notes. Enlarge (credit: SOPA Images / Contributor | LightRocket) Continuing to evolve the fact-checking service that launched as Twitter's Birdwatch, X.....»»
Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s threat researchers. Several PoC exploits have been published, including one.....»»
Signatures should become cloud security history
It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for crea.....»»
Vulnerability in Cisco Smart Software Manager lets attackers change any user password
Yep, passwords for administrators can be changed, too. Enlarge Cisco on Wednesday disclosed a maximum-security vulnerability that allows remote threat actors with no authentication to change the password of any user, in.....»»
I turned my iPhone into a BlackBerry, and now my fingers hate me
The Clicks Keyboard case adds a physical keyboard to the iPhone, and I've been using it with the big iPhone 15 Pro Max. Here's what it's like......»»
iMessage patent row between Apple and MPH revived with new subpoena
Apple is fighting to make litigation funding firm Omni Bridgeway comply with a subpoena, demanding details about its relationship with MPH, a company Apple is in a patent lawsuit with over iMessage and FaceTime.Messages on an iPhoneBack in 2018, Finn.....»»
Can digital payments help countries adapt to climate change?
For thousands of farmers in the Philippines, climate change is a direct threat to their livelihoods......»»
Social media polls deliberately skew political realities of 2016, 2020 US presidential elections, finds researchers
Informal political polls conducted on X/Twitter during both the 2016 and 2020 U.S. presidential elections were significantly skewed by questionable votes, many of which may have been purchased from troll farms......»»
Rezonate boosts security for both human and non-human identities
Rezonate unveiled unified coverage from human to non-human identity security (NHI) with comprehensive capabilities: identity inventory and visibility, security posture, compliance, and identity threat detection and response (ITDR). The platform is ta.....»»
Druva unveils data security capabilities to accelerate incident response
Druva announced new capabilities to help its customers accelerate the investigation and remediation of cyber threats. The new Threat Hunting capability empowers IT and security teams to search their global data footprint for indicators of compromise.....»»
Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with Tre.....»»
SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
Malicious Google ads are a well known threat, but malvertising can also be found on other popular online destinations such as Facebook, LinkedIn, and YouTube. Case in point: an enduring campaign that aims to infect Facebook users with the SYS01 infor.....»»
Paris 2024 Olympics to face complex cyber threats
While previous Olympic games have faced cybersecurity threats, the Games of the XXXIII Olympiad, also known as Paris 2024, will see the largest number of threats, the most complex threat landscape, the largest ecosystem of threat actors, and the high.....»»
Stellantis sues another supplier it says withheld parts to extract price increase
Stellantis NV has filed another lawsuit against a parts supplier over a pricing dispute, this time targeting the manufacturer of fuel tanks for the Chrysler Pacifica minivan. The automaker sued Quebec-based Spectra Premium Mobility Solutions Ltd......»»
I have a love-hate relationship with the Google Pixel Fold
The Google Pixel Fold came out over a year ago. After revisiting the phone, I've found some things I still like — and others I can't stand......»»
America’s Aging Dams Are a Catastrophe Waiting to Happen
Climate change presents a growing threat to the nation’s nearly 92,000 dams, many of which are more than 100 years old, as heavy rainfall, flooding, and other forms of extreme weather become more common and severe......»»