Security News > 2024 > February

Incident Response Policy
2024-02-14 16:00

This policy from TechRepublic Premium provides information on defining an incident, assigning an incident response team, documenting a plan and conducting a response. DOCUMENT AN INCIDENT RESPONSE PLAN. Draw up a plan for incident response and start by including a detailed list of system/application/device information.

Romanian hospital ransomware crisis attributed to third-party breach
2024-02-14 15:48

The Romanian national cybersecurity agency has pinned the outbreak of ransomware cases across the country's hospitals to an incident at a service provider. All hospitals caught up in the ransomware scourge are thought to have been breached via the HIS. Per legal reporting obligations in Romania, service providers must inform the DNSC and national CSIRT of incidents that significantly impact the continuity of essential services.

Trans-Northern Pipelines investigating ALPHV ransomware attack claims
2024-02-14 15:24

Trans-Northern Pipelines has confirmed its internal network was breached in November 2023 and that it's now investigating claims of data theft made by the ALPHV/BlackCat ransomware gang. While ALPHV's claims were not directly mentioned by Dornan when asked by BleepingComputer for confirmation, the ransomware gang says its operators stole 183GB of documents from the company's network.

Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyber Attacks
2024-02-14 14:39

Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and large language models (LLMs) to complement their ongoing cyber...

LogMeOnce Review (2024): Is It a Safe & Reliable Password Manager?
2024-02-14 13:46

LogMeOnce is a promising password manager that includes useful features like a password health scorecard, a built-in notes menu and a dark web monitor. You can try out LogMeOnce Ultimate for seven days and LogMeOnce Teams or Business for 14 days.

Ubuntu 'command-not-found' Tool Could Trick Users into Installing Rogue Packages
2024-02-14 13:26

Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems...

DuckDuckGo browser gets end-to-end encrypted sync feature
2024-02-14 13:00

The DuckDuckGo browser has unveiled a new end-to-end encrypted Sync & Backup feature that lets users privately and securely synchronize their bookmarks, passwords, and Email Protection settings across multiple devices. The new feature is available on the latest version of the DuckDuckGo browser for Windows, macOS, iOS, and Android, so syncing can only work between devices running these operating systems.

Southern Water cyberattack expected to hit hundreds of thousands of customers
2024-02-14 12:38

UK utilities giant Southern Water admits between 5 and 10 percent of its customers have had their data stolen during a January cyberattack. In a letter sent to customers already, seen by El Reg, Southern Water said names, dates of birth, national insurance numbers, bank account numbers, sort codes, and payment reference numbers may have been stolen.

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
2024-02-14 12:08

The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis. This is important, because a bunch of NIST's post-quantum options base their security on lattice problems.

Cybersecurity Tactics FinServ Institutions Can Bank On in 2024
2024-02-14 11:23

The landscape of cybersecurity in financial services is undergoing a rapid transformation. Cybercriminals are exploiting advanced technologies and methodologies, making traditional security...