

The Hacker News
Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens
A vulnerability in Microsoft Access that could be exploited to leak a Windows user’s NTLM tokens.
The Hacker News
A vulnerability in Microsoft Access that could be exploited to leak a Windows user’s NTLM tokens.
Security Affairs
Ukraine's intelligence service announced the hack of the Russian Federal Air Transport Agency, 'Rosaviatsia.'
Infosecurity News
CPR said the malware now uses OneDrive instead of Google Drive for storing dynamic C2 server URLs
Bleeping Computer
Google Drive users are reporting that recent files stored in the cloud have suddenly disappeared, with the cloud service reverting to a storage snapshot as it was around April-May 2023.
Cyber Security News
Broadcom has announced the triumphant acquisition of VMware, heralding a watershed moment in the sphere of infrastructure technology.
SecurityWeek
UK and Korea say DPRK state-sponsored hackers targeted governments, defense organizations via supply chain attacks.
CyberScoop
A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities.
The Record
Cybersecurity companies Check Point and Intezer analyzed what appears to be a rewrite of backdoor malware that targeted Israel's education sector as early as 2021.
The Record
Since the beginning of Russia’s invasion of Ukraine, government officials, independent media organizations, and nonprofits have accused Russia of deliberately targeting churches and libraries and looting its most important museums.
Bleeping Computer
A new version of the multi-platform malware known as 'SysJoker' has been spotted, featuring a complete code rewrite in the Rust programming language.
Security Affairs
Researchers reported that a Hamas-linked APT group is using a rust-based SysJoker backdoor against Israeli entities.
The Hacker News
Beware of Telekopye: The malicious Telegram bot used by the "Neanderthals" for large-scale phishing scams. It crafts phishing websites and emails.
The Hacker News
Researchers found a Rust version of SysJoker, a cross-platform backdoor used by Hamas-affiliated threat actor targeting Israel during ongoing conflict
The Record
The European Parliament adopted a resolution on Thursday criticizing the bloc’s executive for failing to bring forward any laws that would address spyware abuses.
The Record
A decade after its founding, the internet freedom organization Roskomsvoboda finds itself adjusting to harsh political and social realities within Russia, where a wartime regime continues to expand its authority over the internet.
Infosecurity News
New scam identified by Check Point Threat Intelligence Blockchain system
Infosecurity News
The UK’s NCSC and South Korea’s NIS issued a joint advisory describing some of North Korean hackers’ tactics in deploying supply chain attacks
The Hacker News
Effective Incident Response is more than just tools. It's a process. Explore the 6-step framework for successful IR.
Cyber Security News
Microsoft released multiple security patches as part of their Patch Tuesday in which three zero-day vulnerabilities were also patched.
CSO
Cyberattacks have grown in frequency as well as sophistication as the Israel-Hamas conflict intensifies.
The Record
Hackers who attacked the Kansas court system last month stole records and confidential files, according to the state's Supreme Court.
DarkReading
The actor behind the high-profile MGM incident jumps across segmentations in under an hour, in a ransomware attack spanning Okta, Citrix, Azure, SharePoint, and more.
The Hacker News
🔒 Multiple vulnerabilities found in laptop fingerprint sensors—allowing attackers to bypass Windows Hello authentication on Dell, Lenovo, and Microso
The Hacker News
AI Solutions Are the New Shadow IT - Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security Risks
The Hacker News
LockBit ransomware affiliates are exploiting the Citrix NetScaler flaw ("Citrix Bleed") to hijack user sessions and gain unauthorized access.
Ars Technica
LitterDrifter's means of self-propagation are simple. So why is it spreading so widely?
Trend Micro
The Trend Micro Managed XDR team encountered malicious operations that used techniques similar to the ones used by Genesis Market, a website for facilitating fraud that was taken down in April 2023.
The Record
Killmilk is a 30-year-old Russian citizen, according to the news site Gazeta.ru. The report has drawn extra scrutiny to Killnet, known for DDoS attacks on Western targets.
Cyber Security News
Rhysida, a new ransomware group, hit its first victim in May 2023. They use their ransomware, offered as RaaS (Ransomware-as-a-Service), with at least 50 global victims listed on their website.
CyberNews
Cybersecurity exec plead guilty to hacking hospitals to boost business.
SecurityWeek
Lasso Security raises $6 million in seed funding to tackle cyber threats to secure generative AI and large language model algorithms.
DarkReading
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.
The Record
The bug has caused alarm for weeks as cybersecurity experts warned that many government agencies and major companies were leaving their appliances exposed to the internet — opening themselves up to attacks.
The Record
Binance, the largest cryptocurrency exchange in the world, agreed to pay more than $4 billion in settlements with several U.S. law enforcement agencies after years of investigations uncovered widespread criminal use of the platform.
Bleeping Computer
A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as part of a campaign from the Gamaredon state-sponsored espionage group.
DarkReading
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
Ars Technica
Ilya Sutskever announces regret; 505 OpenAI employees sign letter asking board to resign.
CyberNews
Anonymous Sudan attacks on OpenAI and Cloudlfare are meant to show the groups' capabilities.
SecurityWeek
Johnson Controls patches a critical vulnerability that can be exploited to take complete control of Frick industrial refrigeration products
SecurityWeek
Russian Gamaredon’s self-propagating LitterDrifter USB worm spreads from Ukraine to the US and other countries.
CyberSecurity Dive
Being open about the incident engendered goodwill from customers and colleagues, executives said.
The Record
The British Library — one of the largest libraries in the world and the national library of the United Kingdom — said the ransomware gang behind a recent attack on its systems appeared to leak data stolen from its human resources files.
Security Affairs
Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB.
The Hacker News
Russian cyber espionage group linked to the FSB are using a USB worm called LitterDrifter to target Ukrainian organizations.
Ars Technica
After Altman firing, Microsoft has "utmost confidence" in partner OpenAI.
DarkReading
Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.
CyberNews
The EU’s executive branch said advertising on X posed “reputational damage” while IBM pulled ads after they were displayed next to Nazi content.
Infosecurity News
Check Point Research say these latest luxury brand scams are a wake-up call for shoppers to stay vigilant online
The Record
Despite the countries' warm relationship, Russia is being targeted by North Korean and Chinese state hacking groups, a cybersecurity firm connected to Rostelecom claims.
The Record
The Information Commissioner’s Office (ICO) said it agreed with some aspects of a ruling from October, but ultimately wants to clarify whether Clearview AI can characterize certain activities as working with "law enforcement."
The Record
In a recent campaign, the hacking group tracked as UAC-0050 attempted to spread the Remcos remote access tool, according to research by Ukraine's computer emergencies response team (CERT-UA).
The Record
North Carolina Central University is investigating a cyberattack this week, as are school districts in Michigan, Oregon and Atlanta.
Cyber Security News
GPT excels in verbal thinking, skillfully choosing precise words for optimal responses. Understanding this key property is crucial, as much of its subsequent behavior stems from this ability.
Cyber Security News
Best Network Security Vendors for SaaS : 1. Perimeter 81 2. Palo Alto Networks 3. Fortinet 4. Symantec 5. Check Point 6. McAfee 7. Okta.
CyberNews
Henry Schein confirms an October data breach, claimed by APLHV/BlackCat ransom group, and reveals that customer bank account and credit card numbers were likely exposed.
Cyber Security News
A ransomware attack is a horrible time to discover that your backups are not secure, so to help, here’s an 8-point checklist.
Bleeping Computer
The FBI and CISA warned today of Rhysida ransomware gang's opportunistic attacks targeting organizations across multiple industry sectors.
Bleeping Computer
Multiple fake accounts impersonating cryptocurrency scam investigators and blockchain security companies are promoting phishing pages to drain wallets in an ongoing campaign on X (former Twitter).
Bleeping Computer
Multiple fake accounts impersonating cryptocurrency scam investigators and blockchain security companies are promoting phishing pages to drain wallets in an ongoing campaign on X (former Twitter).
Cyber Security News
In a recent development, the WPScan team has unearthed a significant security flaw within the widely-used WP Fastest Cache plugin.
CyberNews
AI image generators are disproportionately trained on white faces – to such an extent that they are even perceived as more real than human ones.
CyberNews
Security researchers are blaming a now-patched Citrix zero-day vulnerability for a recent spate of ransomware attacks said to be carried out by the LockBit gang.
The Record
The Ukrainian military’s ability to recover from the Russian attack on satellite company Viasat is an example of the need for redundant systems and resilient organizations, according to a top U.S. government cybersecurity official.
The Record
The elite U.K. hacking unit eventually will be more integrated into police operations, alongside military and intelligence ones, according to Gen. Sir Jim Hockenhull, the chief of Strategic Command.
DarkReading
The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
Cyber Security News
Best Network Security Companies for CISO: 1. Perimeter81 2. Palo Alto Networks 3. Cisco 4. Check Point 5. IBM 6. Crowdstrike 7. Trend Micro.
Bleeping Computer
A Russian hacking group known as AlphaLock is launching a "pentest" marketplace and training platform to empower a new generation of threat actors. Learn more from Flare about the new hacking group.
Ars Technica
LockBit victims, among the world's most powerful firms, can't be bothered to patch, it seems.
SecurityWeek
Chris Wysopal (AKA Weld Pond) founder and CTO of Veracode and member of the hacker collective L0pht Heavy Industries.
The Hacker News
Data breaches cost businesses $4.45 million on average in 2023! Don't let your organization become a statistic.
CyberNews
More than 30 civil liberties and privacy groups wrote to US Senate majority leader Chuck Schumer, urging him to rethink reauthorizing a contentious surveillance program.
CyberSecurity Dive
This year has seen a trio of supply-chain attacks that created turmoil for thousands of corporate victims and their customers.
CyberNews
Hackers potentially linked to Russia’s military intelligence carried out a series of highly coordinated cyberattacks on Danish energy infrastructure, a report says.
The Record
The leading cybersecurity agencies in the U.S. released startling new data on the Royal ransomware gang on Monday, confirming previous reports that the gang may be preparing for a rebrand.
The Record
Tom Tugendhat, Britain’s minister of state for security — and a Conservative Party politician — decried on Tuesday AI-generated fake audio clips that intended to damage the reputations of high-profile opposition politicians in the United Kingdom.
The Record
A cyberattack on a North Carolina county has forced officials to call in the state’s national guard for assistance.
The Record
The FBI dismantled the IPStorm botnet proxy network and its infrastructure this week following a September plea deal with the hacker behind the operation.
Trend Micro
This blog entry explores the effectiveness of ChatGPT's safety measures, the potential for AI technologies to be misused by criminal actors, and the limitations of current AI models.
Infosecurity News
Cado Security Labs said the bot agent exhibited various methods for conducting DDoS attacks
CyberNews
Cyber assaults on the aviation sector carry more serious repercussions than mere data theft or DDoS attacks.
The Hacker News
Researchers warn of BiBi-Windows Wiper, a dangerous Windows version of a wiper malware used in cyber attacks on Israel.
The Record
The joint venture of the Royal Bank of Canada and Bank of Montreal said its cybersecurity team “prevented access to critical data and no ransom request was made.”
CSO
DP World Australia restricted port operations for two days following the discovery of a cyber incident.
Cyber Security News
Best security solutions for Marketers: 1. Perimeter 81 2. Surfshark3. Private Internet Access 4. Malwarebytes 5. CyberGhost 6. GoodAccess
Cyber Security News
developers at PortSwigger released a new version of Burp Suite for ethical hackers and security professionals, which is Burp Suite 2023.10.3.4
The Hacker News
Researchers found a persistent backdoor called Effluence in compromised Atlassian Confluence servers. This allows attackers to access resources and da
The Record
Hackers are targeting Urdu speakers with spyware delivered through an infected popular news site, according to a new report.
The Record
The Click Here podcast team reports on wartime technological improvisations: An activist unexpectedly leads an effort to identify the missing and the dead. And an English teacher finds a way to connect mobile phones as infrastructure collapses.
CyberNews
Top global law firm Allen & Overy (A&O) said some of its systems have been impacted due to a “data incident” claimed by the LockBit ransomware group.
CyberScoop
Microsoft and Mandiant researchers believe Iranian hackers were not prepared for the initial Hamas attack.
CyberNews
Dolly.com was attacked, paid the ransom, but attackers still published its data.
Cyber Security News
Top Incident Response Plans : 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons learned.
Bleeping Computer
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the final stage of the attack quicker and with less resources
The Hacker News
Beware of email auto-forwarding pitfalls. Learn how Wing Security's free tool can safeguard your sensitive data.
CyberSecurity Dive
Threat actors have used phishing attacks and exploited vulnerabilities in third-party vendor remote access tools to target the casino gaming industry.
The Record
The Russian ransomware gang behind the exploitation of several popular file transfer tools is now exploiting a new vulnerability in SysAid IT support software, according to a new report.
DarkReading
The attacks are another manifestation of the concerning rise in information stealers for harvesting data and enabling persistent access to enterprise networks.
Cyber Security News
Researchers that APTs cause financial harm to organizations.Current online systems prioritize simplicity but create complex graphs.
Computerworld
Microsoft has brought biometric sign-in to Windows 10 business and enterprise users with Windows Hello for Business. Here’s how it works and how to deploy it to your users.
CSO
Enterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.
Ars Technica
Novel-sized context window, DALL-E 3 API, more announced on OpenAI DevDay 2023.
The Hacker News
Iranian-linked Agonizing Serpens APT group using novel wiper malware and tactics to target Israeli education and tech sectors.
Infosecurity News
NCSC wants to ease transition to quantum safety
The Hacker News
U.S. Treasury imposes sanctions on Russian woman for laundering virtual currency for elites and cybercriminal groups, including Ryuk ransomware.
The Record
Education and healthcare institutions seem to be targets in the latest wave of Jupyter infections, according to VMware's Carbon Black team.
The Hacker News
StripedFly, a stealthy malware posing as a crypto miner, has infected over a million devices worldwide and has flown under the radar for 5 years.
Bleeping Computer
A former Dutch cybersecurity professional was sentenced to four years in prison after being found guilty of hacking and blackmailing more than a dozen companies in the Netherlands and worldwide.
CSO
The UK National Cyber Security Centre has refreshed its guidance to help system and risk owners plan their migration to post-quantum cryptography (PQC).
The Hacker News
Discover how predictive AI is shaping the future of cybersecurity. Learn how BlackBerry's Cylance AI is outperforming the competition in malware.
The Record
The National Cyber Security Centre says that more than just mathematics will be necessary to meet the threat that quantum computers pose to traditional public-key cryptography.
The Record
Apple has sent alerts to people in Armenia in recent weeks that their phones are being targeted by state-sponsored hackers, with several cybersecurity experts warning that it is likely tied to Pegasus spyware.
The Record
Natalie Mottram, 25, was arrested in June and now begins a prison sentence of more than three years for misconduct in public office, perverting the course of justice and unauthorized access to computer material.
The Record
The zero-day bugs affecting products from Citrix and Apache have critical severity scores and require immediate attention, experts warned.
CSO
Microsoft launches the Secure Future Initiative to usher in “next generation” of cybersecurity to better protect customers against escalating cybersecurity threats.
CyberScoop
Policymakers and researchers have sharply criticized Microsoft’s security practices after an illicitly obtained key enabled a wide-ranging espionage operation.
The Hacker News
Worried about shadow IT and SaaS security? Wing Security's "Essential SSPM" offers a solution. Discover, Assess, Control.
Computerworld
After little more than a year on the job, Cisco CIO Fletcher Previn can already see that AI will create productivity and efficiency gains well worth the money spent on developing domain-specific models to address internal and external business plans.
SecurityWeek
The recent shutdown of the Mozi botnet is believed to have been carried out by its creators, possibly forced by Chinese authorities.
SecurityWeek
Check Point reports that an Iranian APT has been observed using a new malware framework in targeted attacks in the Middle East.
Bleeping Computer
LayerX has developed a secure enterprise browser extension that delivers comprehensive visibility, monitoring, and granular policy enforcement on every event within a browsing session. Learn more about this cybersecurity platform from LayerxSecurity.
Computerworld
John Strosahl became CEO in September when he took over from Dean Hager. We caught up with him to discuss Apple's growing role in the enterprise and the future of his company.
SecurityWeek
DPI can still be useful in a modern SOC, but its effectiveness and relevance depend on the specific security needs of the organization.
The Hacker News
Protect your organization's most critical interface—The Browser! LayerX's secure extension offers comprehensive visibility and policy enforcement, de
The Hacker News
Iranian threat actor "Scarred Manticore" has launched a year-long cyber espionage campaign targeting the Middle East finance, government, military.
CyberSecurity Dive
With details scant, worries remain about how the attacks might have played out for less security-focused businesses that were impacted.
The Hacker News
State-sponsored North Korean hackers are using a sneaky macOS malware called KANDYKORN to target crypto engineers via Discord.
CSO
The new platform is designed to drastically reduce alert noise and allow security teams to focus on genuine threats.
DarkReading
The wider availability of turnkey cyberattack kits in the criminal underground is leading to a glut of campaigns using remote access Trojans (RATs).
CSO
The iLeakage proof of concept targets Apple silicon devices running Safari, demonstrating techniques that improve on Sceptre and MeltDown exploits and demonstrate continuing vulnerabilities in modern CPUs.
DarkReading
Cybercriminals are upping their phishing with shortened links and showing that coveted, regulated top-level domains aren't as exclusive as you'd think.
Infosecurity News
Discovered by Check Point Research (CPR) and Sygnia, the campaign peaked in mid-2023
SecurityWeek
Overcoming the failures and challenges of Zero Trust Network Access (ZTNA) for in-office and remote users
CSO
SEC has accused SolarWinds and its CISO of understating cybersecurity risks to stakeholders and said the company missed numerous red flags.
Computerworld
With the first global AI Safety Summit beginning in the UK on Nov. 1, questions remain over whether the event will facilitate a meaningful outcome and if there will ever be a global consensus on AI regulation.
Bleeping Computer
Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as a zero-day to hack tens of thousands of devices.
The Record
An Iranian nation-state threat actor is targeting high-profile organizations in the Middle East in an ongoing espionage campaign, according to a new report.
Bleeping Computer
Hackers have stolen $4.4 million in cryptocurrency on October 25th using private keys and passphrases stored in stolen LastPass databases, according to research by crypto fraud researchers who have been researching similar incidents.
Ars Technica
From netbooks and PDAs to ATMs, voting kiosks, and ungainly presidential phones.
Bleeping Computer
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and allows the takeover of vulnerable devices.
Computerworld
The White House today issued a long-awaited executive order that hammers out clear rules and oversight measures to ensure artificial intelligence is kept in check, while also providing paths for it to grow.
Infosecurity News
Kaspersky unveiled the cyber campaign at the Security Analyst Summit
Ars Technica
Order details US admin's approach to AI safety, media authenticity, job loss, and more.
SecurityWeek
New capability detects attacks on iMessage servers and allows users to verify a conversation partner’s identity.
SecurityWeek
Are whistleblowers a danger to corporate brand image, and an insider threat? Or can they be used to strengthen cybersecurity and compliance?
The Hacker News
Three new high-severity security flaws discovered in NGINX Ingress controller for Kubernetes. Hackers can steal secret credentials.
Trend Micro
Customer feedback validates Trend's leadership in in XDR, endpoint security, hybrid Cloud
Bleeping Computer
Ransomware attacks are increasing significantly, with reports indicating that last month was a record month for ransomware attacks in 2023.
Ars Technica
Long mobile conversations with the AI assistant using AirPods echo the sci-fi film.
Cyber Security News
Best Cloud Access Security Broker (CASB) Software: 1. DoControl CASB 2. Microsoft Cloud App Security 3. Forcepoint 4. Palo Alto Networks.
CyberSecurity Dive
Microsoft researchers described Octo Tempest, or Oktapus, as one of the most dangerous financial criminal groups currently in operation.
CSO
Report shows the importance of ensuring OAuth implementation is secure to protect against identity theft, financial fraud, and access to personal information.
The Record
On a recent trip to Ukraine, Click Here spoke with Kateryna Goncharova, a Ukraine heritage crisis specialist with the World Monuments Fund (WMF), about a high-tech conservation effort to restore cultural sites damaged in the war.
Ars Technica
“From the get-go, this feature was useless,” researcher says of feature put into iOS 14.
CyberScoop
The Russian cybersecurity firm discovered sophisticated malware that combined cryptocurrency mining and espionage capabilities.
Infosecurity News
Kaspersky said the attack exploited five vulnerabilities, four of which were unknown zero-days
Infosecurity News
Two leading CISOs provide best practice tips for CISOs on undertaking a sustainable cyber risk management program
CSO
The identity governance and security offering will automate access requests, detect weak access patterns, and help with incident response.
The Record
A catalog of exploited vulnerabilities run by the top cybersecurity agency in the U.S. is having a significant effect on the security of federal civilian agencies, according to Congressional testimony from a senior official.
The Record
On a recent trip to Ukraine, Click Here spoke with Ukraine's Alex Bornyakov about the country's booming drone sector and the Brave1 initiative, which aims to get innovative weapons into the hands of soldiers in a matter of weeks, not months.
Bleeping Computer
Chile's Grupo GTD warns that a cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting online services.
Ars Technica
Altered images could destroy AI model training efforts that scrape art without consent.
Bleeping Computer
Windows 11 will let admins mandate SMB client encryption for all outbound connections, starting with today's Windows 11 Insider Preview Build 25982 rolling out to Insiders in the Canary Channel.
SecurityWeek
Critical infrastructure defenders should urgently work to find and remove traces of Volt Typhoon, a Chinese government-backed hacking team.
The Record
When a Russian bomb damaged a beloved library in the Ukrainian city of Chernihiv, locals feared that it would be lost forever. Then a cutting-edge technology came to the rescue.
SecurityWeek
Rockwell Automation has warned customers about the impact of the actively exploited Cisco IOS XE zero-day on its Stratix industrial switches.
SecurityWeek
The number of Cisco devices hacked via recent zero-days remains high, but the attackers have updated their implant.
The Hacker News
Sophisticated Apple iOS attack dubbed Operation Triangulation employed clever techniques to targets victims with a backdoor implant called "TriangleDB
The Record
Finland's investigation into the damage found a dragging trail on the seabed leading to the point of damage in the gas pipeline. The report left open the question of whether the damage was intentional or accidental.
SecurityWeek
Chinese authorities have netted thousands of people in a crackdown on cyber scams, but the criminal networks remain intact.
SecurityWeek
Cisco has found a second zero-day vulnerability that has been exploited in recent attacks as the number of hacked devices has dropped.
The Hacker News
DLL side-loading, a tactic used by malicious actors, helps Quasar RAT and other malware evade detection, steal data.
The Record
Section 702 of the Foreign Intelligence Surveillance Act (FISA) will sunset on January 1 without congressional action. Several committee chairman are pushing ahead with bills to renew the controversial law.
CyberNews
No slickly edited five-minute video can explain the Israeli-Palestinian conflict with adequate context, professor Mazza says.
Ars Technica
Politeness and emphasis play a surprising role in AI-model communications.
Ars Technica
Turns out that only lightning could kill the otherwise-unkillable US-8-150W.
Infosecurity News
Top threats targeting the EU are increasingly motivated by a combination of intentions such as financial gain, disruption, espionage or ideology
The Hacker News
IoT adoption is on the rise, but it comes with risks. Explore the challenges and opportunities of seamlessly integrating IoT into your business while
ZDNet
The ransomware business is booming, and really anyone can be the next victim. Here's how to protect yourself and your organization from an attack. Too late for prevention? We'll show you what to do next.
DarkReading
State-sponsored cyberespionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a patching lag plagues the software's footprint.
Computerworld
As pressure grows for Apple to support app purchases from outside its App Store, reports the company has fired App Store staffers for 'business misconduct' should send a little chill up your spine.
The Hacker News
Discover the importance of continuous vulnerability scanning in 2023 and how it can protect your business from emerging threats.
CyberSecurity Dive
VC activity in cybersecurity reflects a pragmatic period in an industry oversaturated with vendors, Crunchbase data shows.
CSO
With the new code-to-cloud intelligence capabilities, Prisma Cloud aims to create a single point of security control for all cloud-native workflows.
CyberScoop
Despite an August patch, Russian and Chinese state-backed hackers are using a vulnerability in the popular software to carry out espionage.
SecurityWeek
Since launching in 2021, Darwinium has raised $26 million to build a bot and fraud prevention platform running on the perimeter edge.
CyberNews
DDoS attacks are currently on the rise.
The Hacker News
Hackers seek vulnerabilities and attack paths. Discover 7 real-life scenarios where exposure management made the difference in safeguarding critical a
Bleeping Computer
Twitter, now renamed X, is testing new $1 annual subscriptions to provide unverified accounts access to core features like tweeting and retweeting.
The Record
Ukrainian officials speak with the Click Here podcast team about something they previously kept close to the vest: Their country's hunt forward operations with personnel from U.S. Cyber Command.
DarkReading
Once ethics guardrails are breached, generative AI and LLMs could become nearly unlimited in its capacity to enable evil acts, researchers warn.
SecurityWeek
The feared ‘cryptopocalypse’ (the death of current encryption) might be sooner than expected – caused by in-memory computing ASICs rather than quantum computers.
The Hacker News
Ukraine's CERT-UA discovered threat actors targeting 11 telecom providers between May and September 2023. The attacks caused service interruptions.
The Record
As Russia’s war with Ukraine drags on, the Kremlin has doubled down on its efforts to take control of the internet on its own turf.
SecurityWeek
Australian AI researchers teach an unmanned military robot’s operating system to identify MitM cyberattacks.
Trend Micro
This blog discusses how threat actors abuse Discord’s content delivery network (CDN) to host and spread Lumma Stealer, and talks about added capabilities to the information stealing malware.
Bleeping Computer
Kwik Trip has been impacted by a wide range of mysterious business disruptions since this weekend that are indicative of a ransomware attack.
The Hacker News
Kaspersky sheds light on hacking group ToddyCat's latest arsenal of tools. Designed for data theft, their tactics are more advanced than ever.
The Hacker News
Ransomware attacks have evolved in Q3-2023, employing new techniques to bypass defenses. Discover the strategies ransomware groups have been adopting.
The Record
Tech and cybersecurity executives who build their businesses in Israel are always aware of the possibility of war.
Bleeping Computer
A newly discovered campaign dubbed "Stayin' Alive" has been targeting government organizations and telecommunication service providers across Asia since 2021, using a wide variety of "disposable" malware to evade detection.