Information security

[ follow ]
Information security
fromTheregister
3 hours ago

Ransomware crims broke in, found recovery codes in plaintext

Unencrypted recovery codes on a desktop enabled attackers to bypass MFA, compromise detection tools, steal credentials, and deploy ransomware across the network.
#data-breach
fromIT Pro
4 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

fromIT Pro
4 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

#zero-trust
fromSecurityWeek
4 hours ago
Information security

Zero Trust Is 15 Years Old - Why Full Adoption Is Worth the Struggle

Zero trust is a sound cybersecurity model, but implementation remains incomplete after 15 years, resulting in uneven, partial adoption rather than full deployment.
fromSecuritymagazine
3 days ago
Information security

Zero Trust vs. Adaptive Identity: What CISOs Are Getting Wrong

Adaptive identity continuously assesses user trust using changing context and risk signals, replacing static point-in-time checks to strengthen Zero Trust defenses.
Information security
fromDataBreaches.Net
2 hours ago

Hackers claim access to law enforcement portals, but do they really have access? - DataBreaches.Net

Threat actors claimed access to the U.S. CJIS background-check portal and Google's law-enforcement request system; Google disabled a fraudulent account and reported no data accessed.
Information security
fromDataBreaches.Net
2 hours ago

Update: Kering confirms Gucci and other brands hacked; claims no conversations with hackers? - DataBreaches.Net

Millions of customers of Kering brands had personal data accessed in two Salesforce breaches, with alleged ransom negotiations and partial disclosure to authorities and customers.
Information security
fromThe Hacker News
3 hours ago

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

Mustang Panda deploys updated TONESHELL variants and a Thailand-targeting USB worm SnakeDisk that drops the Yokai backdoor and uses proxy-based C2 and evasion techniques.
Information security
fromSecuritymagazine
22 hours ago

When the Breach Isn't Yours but the Headline Is: Managing Association Risk

Association risk causes reputational spillover from cybersecurity breaches to adjacent organizations, requiring proactive PR to build resilience and control narrative.
#cybersecurity
fromBusiness Insider
13 hours ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

fromForbes
4 days ago
Information security

Why Human Error Is Cybersecurity's Top Threat

Human error and insecure user devices now represent the primary cybersecurity risk as remote work and cloud services expand the attack surface.
fromBusiness Insider
4 days ago
Information security

A white-hat hacking gambit spawned $48 million in venture funding for cybersecurity startup Koi. Read its pitch deck.

Koi raised $48 million to protect companies from risky add-on software such as browser extensions and packages that can evade traditional IT protections.
fromBusiness Insider
13 hours ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

fromBusiness Insider
4 days ago
Information security

A white-hat hacking gambit spawned $48 million in venture funding for cybersecurity startup Koi. Read its pitch deck.

fromSecuritymagazine
22 hours ago

Unlocking Security Talent: Questions HR Should Ask and What Their Answers Reveal

Security management positions are filled much less often in corporations compared to roles related to general business functions. Excluding guarding operations, security professionals are generally far outnumbered by members of other departments within companies. Consequently, in-house talent acquisition teams may find it challenging to identify strong candidates due to their infrequent recruitment for security roles. Hiring managers who effectively convey their requirements to recruiters, whether internal or external, often experience more successful hiring outcomes.
Information security
#post-quantum-cryptography
fromIT Pro
3 days ago
Information security

What will the Quantum-Safe 360 Alliance mean for your business and its post-quantum security posture?

fromIT Pro
3 days ago
Information security

What will the Quantum-Safe 360 Alliance mean for your business and its post-quantum security posture?

#ransomware
fromDataBreaches.Net
1 day ago
Information security

Interview with Valery Rie-Marchive - Managing Leaks in Ransomware Negotiations - DataBreaches.Net

fromDataBreaches.Net
1 day ago
Information security

Interview with Valery Rie-Marchive - Managing Leaks in Ransomware Negotiations - DataBreaches.Net

Information security
fromDataBreaches.Net
10 hours ago

Ex-WhatsApp cybersecurity executive says Meta endangered billions of users in new suit - DataBreaches.Net

Meta allegedly neglected WhatsApp security, exposed user data, violated cybersecurity regulations, and retaliated against its head of security who reported failures.
Information security
fromSecurityWeek
3 days ago

VMScape: Academics Break Cloud Isolation With New Spectre Attack

VMScape enables Spectre-BTI attacks from guest to host, leaking hypervisor and VM memory, exposing cryptographic keys on many Intel and AMD CPUs.
fromZDNET
5 hours ago

Crowdstrike and Meta just made evaluating AI security tools easier

CrowdStrike has teamed up with Meta to launch a new open-source suite of benchmarks to test the performance of AI models within an organization's security operations center (SOC). Dubbed , the suite is designed to help businesses sift through a growing mountain of AI-powered cybersecurity tools to help them hone in on one that's ideally suited for their needs. "Without clear benchmarks, it's difficult to know which systems, use cases, and performance standards deliver a true AI advantage against real-world attacks," CrowdStrike wrote in a press release.
Information security
Information security
fromSecurityWeek
8 hours ago

Silent Push Raises $10 Million for Threat Intelligence Platform

Silent Push raised $10M Series B to expand globally and enhance its proactive threat intelligence platform providing indicators of future compromise.
#salesforce
fromIT Pro
12 hours ago
Information security

How to check if you've been affected by Salesforce attacks - and stop hackers dead in their tracks

fromIT Pro
12 hours ago
Information security

How to check if you've been affected by Salesforce attacks - and stop hackers dead in their tracks

fromThe Hacker News
14 hours ago

AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns

A new artificial intelligence (AI)-powered penetration testing tool linked to a China-based company has attracted nearly 11,000 downloads on the Python Package Index (PyPI) repository, raising concerns that it could be repurposed by cybercriminals for malicious purposes. Dubbed Villager, the framework is assessed to be the work of Cyberspike, which has positioned the tools as a red teaming solution to automate testing workflows.
Information security
Information security
fromwww.bbc.com
6 days ago

It's taken three years to recover from China hack, election watchdog says

The UK's Electoral Commission took three years and at least £250,000 to recover from a hack exposing 40 million voters after basic security failures.
fromThe Hacker News
10 hours ago

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

In most scenarios, attackers don't think of themselves as attacking your web browser. Their end-goal is to compromise your business apps and data. That means going after the third-party services that are now the backbone of business IT. The most common attack path today sees attackers log into third-party services, dump the data, and monetize it through extortion. You need only look at last year's Snowflake customer breaches or the still-ongoing Salesforce attacks to see the impact.
Information security
fromBusiness Matters
23 hours ago

How Roobet and SEON Work Together on Fraud Prevention

Online gaming fraud prevention is more than a compliance requirement-it's central to how Roobet builds trust with players and protects its platform. In a high-velocity environment where fraud tactics evolve quickly, maintaining that trust takes more than reactive tools. That's why Roobet chose SEON. Its real-time fraud prevention and AML technology gives the platform the flexibility to adapt quickly, the visibility to detect emerging threats, and the control to stop fraud before it impacts gameplay or user experience.
Information security
fromThe Hacker News
16 hours ago

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks

Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute malware. "The attackers manipulated search rankings with SEO plugins and registered lookalike domains that closely mimicked legitimate software sites," Fortinet FortiGuard Labs researcher Pei Han Liao said. "By using convincing language and small character substitutions, they tricked victims into visiting spoofed pages and downloading malware."
Information security
Information security
fromDevOps.com
6 hours ago

WhiteCobra Targets Developers with Dozens of Malicious Extensions - DevOps.com

WhiteCobra distributes malicious VSCode and Open VSX extensions to steal cryptocurrency wallets from developers using VSCode, Cursor, and Windsurf.
fromTheregister
10 hours ago

Nork snoops whip up fake military ID with help from ChatGPT

Kimsuky, a notorious cybercrime squad believed to be sponsored by the North Korean government, used a deepfaked image of a military employee ID card in a July spear-phishing attack against a military-related organization, according to the Genians Security Center (GSC), a South Korean security institute. The file's metadata indicated it was generated with ChatGPT's image tools, according to Genians, despite OpenAI's efforts to block the creation of counterfeit IDs.
Information security
Information security
fromZDNET
10 hours ago

Can't upgrade your Windows 10 PC? You have 5 options - and just weeks to act

Windows 10 reaches end of support on October 14, 2025; users must choose upgrades, free extended updates, or paid options to remain secure.
Information security
fromBusiness Insider
16 hours ago

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.
Information security
fromNature
22 hours ago

GPS timekeeping is increasingly vulnerable: here's how to deliver future-proofed time

Modern society critically depends on GNSS-derived timing, yet GNSS vulnerabilities (jamming, spoofing, weather) create underappreciated risks requiring stronger, diversified timing resilience.
Information security
fromwww.theguardian.com
1 day ago

Password1: how scammers exploit variations of your logins

Reusing or slightly altering the same password across accounts enables credential-stuffing attacks that allow criminals to access large numbers of accounts.
Information security
fromTheregister
1 day ago

Destroy data on old laptops or face major liability

Improperly erased corporate devices can expose sensitive data and trigger multimillion-dollar regulatory fines and legal liabilities.
fromeLearning Industry
1 day ago

Onboarding Compliance: Automating PDF Validation So Your Remote Team Can Focus On Learning

The Slack pings, welcome emails, and virtual coffee chats were a blur, but the moment that kept me awake came later that night: Did we actually capture every signature we need? That nagging question set me on a year‑long quest to remove guesswork- and 3 a.m. logins- from our onboarding compliance checklist. What follows is the distilled playbook I now trust to prove every legal box is ticked before a new starter even spots the Wi‑Fi password on their laptop sleeve.
Information security
Information security
fromFortune
1 day ago

North Korean hackers used ChatGPT to help forge deepfake ID | Fortune

A suspected North Korean hacking group used ChatGPT to create a deepfake military ID image to support a phishing attack on a South Korean target.
Information security
fromEntrepreneur
2 days ago

Future-Proof Your IT Career with Lifetime Access to 90+ Cybersecurity Courses | Entrepreneur

Lifetime access to InfoSec4TC Platinum provides continuously updated cybersecurity certification training, exam resources, mentorship, and career support for a one-time $52.97 limited-time fee.
Information security
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP protects sensitive data and controls its flow; EDR detects, investigates, and responds to endpoint threats.
Information security
fromInfoQ
2 days ago

Cloudflare Introduces Automated Scoring for Shadow AI Risk Assessment

Cloudflare launched Application Confidence Scores providing 1–5 Application and Gen‑AI ratings to evaluate safety, security, compliance, and data practices of third-party AI apps.
Information security
fromDataBreaches.Net
2 days ago

FBI Flash Alert: Cyber Criminal Groups UNC6040 and UNC6395 Compromising Salesforce Instances for Data Theft and Extortion - DataBreaches.Net

Cybercriminal groups UNC6040 and UNC6395 target organizations' Salesforce platforms for data theft and extortion; Indicators of Compromise (IOCs) are provided to aid detection and network defense.
fromDataBreaches.Net
2 days ago

China's Great Firewall suffers its biggest leak ever as 500GB of source code and docs spill online - censorship tool has been sold to three different countries - DataBreaches.Net

Chinese censorship sprang a major leak on September 11, when researchers confirmed that more than 500GB of internal documents, source code, work logs, and internal communications from the so-called Great Firewall were dumped online, including packaging repos and operational runbooks used to build and maintain China's national traffic filtering system. The files appear to originate from Geedge Networks, a company that has long been linked to Fang Binxing - widely described as the "father" of the Great Firewall -
Information security
Information security
fromThe Hacker News
2 days ago

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

Two distinct cybercriminal groups, UNC6395 and UNC6040, targeted Salesforce platforms to steal data and extort victims using OAuth token compromise and vishing-based access.
fromenglish.elpais.com
2 days ago

Never steal a hacker's girlfriend's phone: How an expert exposed a global network of thieves

Two days later, Vigo received a text message from iCloud, Apple's cloud service: Find my iPhone 13 mini. It has been connected to the internet and located today. Last location. It included a link to a strange address: apple(.)device-maps.net. The text message was awful: typos, a suspicious domain, and iCloud, says Vigo. But as a hacker, and with his partner without her cell phone, Vigo wasn't going to let that message go unnoticed.
Information security
Information security
fromDataBreaches.Net
6 days ago

Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace - DataBreaches.Net

Liridon Masurica pleaded guilty to leading BlackDB.cc, a marketplace selling stolen credentials and personal data, and faces up to 10 years in federal prison.
Information security
fromForbes
3 days ago

5 Pressing Cybersecurity Challenges Every Business Must Address

Businesses must adopt integrated Zero Trust, identity-centric controls, monitoring, and least-privilege practices to mitigate hybrid workforce, insider threats, lateral movement, cloud, and vendor risks.
Information security
fromThe Hacker News
3 days ago

Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage

Runtime visibility in CNAPPs enables real-time prioritization of active, exploitable risks, reducing false positives and focusing response on vulnerabilities that matter.
Information security
fromIT Pro
3 days ago

Mobile app security is a huge blind spot for developer teams - 93% are confident their applications are secure, but 62% reported breaches last year

Organizations overestimate mobile app security readiness despite widespread breaches, accelerated release pressures, and frequent malware, data loss, and credential-theft incidents.
fromSecurityWeek
3 days ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
fromIT Pro
3 days ago

Healthcare organizations report rampant email security failures - and Microsoft 365 is often the weakest link

Healthcare organizations are increasingly being targeted in email attacks, research shows, and Microsoft 365 is often the weakest link. More than half (52%) of all healthcare email breaches last year involved the Microsoft 365 business email platform, up from 43% the year before. According to research from Paubox, there were 107 such attacks in the first half of this year.
Information security
Information security
fromApp Developer Magazine
8 months ago

Salesforce data breach linked to Tenable via Salesloft Drift

A Salesforce-Salesloft Drift integration breach exposed limited customer contact and support case data at multiple organizations, including Tenable, while core product data remained uncompromised.
#cursor
fromZDNET
3 days ago
Information security

This 'critical' Cursor security flaw could expose your code to malware - how to fix it

fromDevOps.com
3 days ago
Information security

Oasis Security Identifies Security Weakness in Cursor AI Coding Tool - DevOps.com

fromZDNET
3 days ago
Information security

This 'critical' Cursor security flaw could expose your code to malware - how to fix it

fromDevOps.com
3 days ago
Information security

Oasis Security Identifies Security Weakness in Cursor AI Coding Tool - DevOps.com

fromTechzine Global
3 days ago

Cybercriminal installs security software only to be found out by it

A cyber attacker installed the Huntress endpoint security solution to protect himself. What he didn't realize was that this allowed Huntress to monitor his activities. Despite some controversy, the security company claims that valuable information was obtained. When a host signaled malware to Huntress, it turned out to be an old acquaintance: the same "machine name," or unique device identifier, had appeared in several previous incidents.
Information security
Information security
fromInfoQ
3 days ago

Secure by Design: Building Security into Engineering Workflows and Teams

Integrate security early and continuously into engineering workflows using communication, collaboration, security champions, and automated standardized processes.
Information security
fromTheregister
3 days ago

'IT manager' had never heard of a command line

A tax office promoted managers internally who often lacked basic IT knowledge, creating support burdens when remote workers required VPN access for Windows sessions.
fromThe Hacker News
3 days ago

Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms

Apple has notified users in France of a spyware campaign targeting their devices, according to the Computer Emergency Response Team of France (CERT-FR). The agency said the alerts were sent out on September 3, 2025, making it the fourth time this year that Apple has notified citizens in the county that at least one of the devices linked to their iCloud accounts may have been compromised as part of highly-targeted attacks.
Information security
#cisa
fromNextgov.com
3 days ago
Information security

CISA ready to accept any extension for key cyber info-sharing law, official says

fromNextgov.com
3 days ago
Information security

CISA ready to accept any extension for key cyber info-sharing law, official says

Information security
fromTheregister
3 days ago

Dutch students denied access to jailbroken laundry machines

Over 1,000 University of Amsterdam students cannot use smart laundry machines after an attack disabled digital payments, forcing continued travel for laundry.
Information security
fromZDNET
3 days ago

These popular free VPNs all share the same shady security practices - here's why

Multiple widely downloaded VPN apps share parent companies and contain security vulnerabilities like hard-coded Shadowsocks keys.
Information security
fromSecuritymagazine
3 days ago

Russian Offensive Cyber Operations: Analyzing Putin's Foreign Policy Actions

Putin leverages cyberattacks, enabled hacktivism, sabotage, and nuclear coercion to advance military objectives, disrupt NATO support, and degrade adversary supply chains.
Information security
fromDataBreaches.Net
3 days ago

Going Dark: ShinyHunters/ScatteredSpider/LAPSUS$ Say Goodbye - DataBreaches.Net

LAPSUS$ hunters claimed law enforcement arrested the wrong person, boasted ongoing capabilities, described contingency activations, and announced their permanent disappearance.
fromTheregister
3 days ago

Samsung patches Android 0-day exploited in the wild

Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices. The vulnerability, tracked as CVE-2025-21043, affects Android OS versions 13, 14, 15, and 16.
Information security
Information security
fromTESLARATI
3 days ago

Tesla Board Chair discusses what is being done to protect CEO Elon Musk

Tesla is increasing and prioritizing long-standing security measures for CEO Elon Musk following political-violence concerns after Charlie Kirk’s assassination.
Information security
fromSecuritymagazine
4 days ago

Navigating Data Security in Financial Services: Lessons from the TeleMessage Breach

Financial institutions must adopt layered security and address human and third-party risks to secure off-channel messaging and comply with global data rules.
fromThe Hacker News
4 days ago

Cracking the Boardroom Code: Helping CISOs Speak the Language of Business

CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders: how do I make the impact of risk clear to business decision-makers?
Information security
fromwww.bbc.com
4 days ago

Children hacking their own schools for 'fun', watchdog warns

Since 2022, the ICO has investigated 215 hacks and breaches in education settings and says 57% were carried out by children. According to the new data, almost a third of the breaches involved students illegally logging into staff computer systems by guessing passwords or stealing details from teachers. In one incident, a seven-year-old was involved in a data breach and subsequently referred to the National Crime Agency's Cyber Choices programme to help them understand the seriousness of their actions.
Information security
fromSecuritymagazine
4 days ago

Critical Steps to Strengthening Satellite Network Security

Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations. As our dependency on satellite networks has increased, so has the risk of cyber threats targeting these critical infrastructures. Any disruption of satellite services can negatively impact everything from emergency response systems to financial transactions to navigation. That makes ensuring the cybersecurity of satellite networks essential to maintaining global stability and security.
Information security
Information security
fromDevOps.com
4 days ago

What Makes Vulnerability Scanning Effective in Fast-Moving DevSecOps Pipelines Today? - DevOps.com

Effective vulnerability scanning must be fast, integrated into CI/CD, and prioritize quality to enable secure continuous delivery without blocking developer flow.
Information security
fromBusiness Matters
4 days ago

LNER warns customers after passenger details exposed in cyber-attack

LNER warns passengers after a third-party supplier cyber-attack exposed customer contact details and some journey history; no financial or ticketing systems were compromised.
fromTelecompetitor
4 days ago

Enterprise Leaders Issue Industry Manifesto to Mandate Mplify SASE Certification

Mplify (formerly MEF), a global alliance of network, cloud, cybersecurity, and enterprise organizations working together to accelerate the AI-powered digital economy, today warned that the $10.5 trillion cybercrime economy (according to Cybersecurity Ventures), weaponized AI, and escalating global conflicts are creating unprecedented risks to IT systems and critical infrastructure. In response, its Enterprise Leadership Council (ELC) has issued a manifesto calling for mandatory SASE certification across all products, services, and solutions under the Mplify framework.
fromNextgov.com
4 days ago

CISA weighs 'alternative funding sources' to preserve cyber vulnerability-tracking project

The Cybersecurity and Infrastructure Security Agency is exploring more diversified funding mechanisms to help cover the cost of a bedrock vulnerability cataloging program that's been relied upon by the cyber community for years. The Common Vulnerabilities and Exposures Program faced a near complete lapse in funding in April when MITRE, the research giant that funds much of the program's functions, warned of an imminent end to federal backing for the cornerstone cybersecurity project. The lapse was reversed within hours after outcry from the cybersecurity community.
Information security
Information security
fromThe Oaklandside
4 days ago

Yet another data-breach letter? Here's what to do

Data breaches are increasingly common, exposing personal information and undermining trust in banks while requiring individuals and institutions to adopt stronger cybersecurity and response measures.
Information security
fromTechCrunch
4 days ago

Apple's latest iPhone security feature just made life more difficult for spyware makers | TechCrunch

Memory Integrity Enforcement (MIE) on iPhone 17 and iPhone Air mitigates memory corruption bugs, significantly increasing difficulty and cost for spyware and exploit developers.
Information security
fromThe Hacker News
4 days ago

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Akira-affiliated threat actors exploit SonicWall vulnerabilities and misconfigured LDAP default user groups to gain initial access and enable ransomware operations.
fromTheregister
4 days ago

Google, Microsoft account takeover made easy via VoidProxy

The phishes target any Google and Microsoft accounts, from small businesses to large enterprises, we're told. And while Okta didn't have a confirmed victim count, "we have observed high-confidence account takeovers in multiple entities," the threat intel team told us. "By extension, we expect Microsoft and Google will have observed a larger number of ATO events, given that VoidProxy proxies non-federated users directly with Microsoft and Google servers."
Information security
from9to5Mac
4 days ago

Mosyle uncovers new cross-platform malware undetected by antivirus tools - 9to5Mac

According to Mosyle's analysis, ModStealer is being delivered to victims through malicious job recruiter ads targeting developers. It uses a heavily obfuscated JavaScript file written with NodeJS that remains completely undetectable by signature-based defenses. And this one isn't just targeting Mac users either; Windows and Linux environments are also at risk. The malware's main goal is data exfiltration, with a particular focus on cryptocurrency wallets, credential files, configuration details, and certificates.
Information security
#microsoft
fromIT Pro
4 days ago
Information security

US Senator calls for Microsoft FTC probe over 'gross cybersecurity negligence' - Ron Wyden claims the tech giant has provided 'dangerous, insecure software' to the US government

fromIT Pro
4 days ago
Information security

US Senator calls for Microsoft FTC probe over 'gross cybersecurity negligence' - Ron Wyden claims the tech giant has provided 'dangerous, insecure software' to the US government

Information security
fromIT Pro
4 days ago

Jaguar Land Rover u-turns on cyber attack containment claims, admits 'some data has been affected'

Jaguar Land Rover admitted hackers likely accessed some data after a late‑August cyberattack that halted production.
Information security
fromTheregister
4 days ago

Brit rail operator data nicked after supplier breached

LNER customer contact details and some journey information were accessed via a third-party supplier; no bank, payment card, or password data were exposed.
fromTheregister
4 days ago

America now leads the world in spyware funding

After years of being dominated by outsiders, the computer surveillance software industry is booming in the United States as investors rush into the ethically dodgy but highly lucrative field. The Atlantic Council think tank reported that US investment in surveillanceware rocketed in the last year and identified 20 new US investors, and noted the number of resellers is also rapidly increasing.
Information security
Information security
fromThe Hacker News
4 days ago

AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto

Threat actors abuse ConnectWise ScreenConnect to deploy a script-based loader that installs AsyncRAT and maintains persistence via a fake 'Skype Updater' scheduled task.
fromTechzine Global
4 days ago

1.5 billion packet-strong DDoS attack targeted anti-DDoS service

DDoS detection tool FastNetMon detected a DDoS attack of 1.5 billion packets per second. The target: a European provider of DDoS scrubbing services. The attack is one of the largest DDoS attacks ever, but still falls far short of the 11.5 billion packets recently detected by Cloudflare. The choice of target is striking in any case: the DDoS attack was aimed at a service that protects other organizations against the consequences of such a "packet flood."
Information security
[ Load more ]