Security News > 2024 > July

Surfshark vs IPVanish (2024): Which VPN Should You Choose?
2024-07-02 10:13

In this review, I compare Surfshark and IPVanish based on pricing, speed, features, customer support and ease-of-use and recommend which service to choose based on your use case and requirements. Need help configuring Surfshark on your device? Read our Surfshark VPN guide.

'Almost every Apple device' vulnerable to CocoaPods supply chain attack
2024-07-02 07:32

EVA claims CocoaPods in 2014 migrated all "Pods" - a file describing a project's dependencies - to a new "Trunk server" on GitHub. CocoaPods authenticates new devices using an email sent to users who request a session, the researchers noted - but authentication doesn't rely on anything but a client verifying their email address by clicking a link.

Baddies hijack Korean ERP vendor's update systems to spew malware
2024-07-02 05:31

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Meta's 'Pay or Consent' Approach Faces E.U. Competition Rules Scrutiny
2024-07-02 05:10

Meta's decision to offer an ad-free subscription in the European Union (E.U.) has faced a new setback after regulators accused the social media behemoth of breaching the bloc's competition rules...

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware
2024-07-02 04:48

A China-nexus cyber espionage group named Velvet Ant has been observed exploiting a zero-day flaw in Cisco NX-OS Software used in its switches to deliver malware. The vulnerability, tracked as...

Leveraging no-code automation for efficient network operations
2024-07-02 04:30

Considering the increasing importance of cybersecurity, what are the key benefits and challenges of merging network operations with security operations? Network automation can emulate SMEs at scale, making it a better fit for this problem.

Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights
2024-07-02 04:29

An Australian man has been charged with running a fake Wi-Fi access point during a domestic flight with an aim to steal user credentials and data. The unnamed 42-year-old "allegedly established...

The impossibility of “getting ahead” in cyber defense
2024-07-02 04:00

A future-oriented cyber defense is therefore not about getting ahead, but about building systems that are inherently more likely to function when components or other systems become compromised, as they inevitably will, sooner or later. Traffic lights "Fail safe" to red, reducing risks of collisions when the system stalls for any reason.

Inside the minds of CISOs
2024-07-02 03:30

In this Help Net Security video, Nick McKenzie, CISO of Bugcrowd, discusses the key findings from their recent report, which comes at a crucial time as security leaders' roles are being discussed more with the current risk landscape and the increasing need to prioritize security first over operational resilience in almost all verticals. Most CISOs believe AI makes the threat landscape impossible to secure.

Deepfakes and voice clones are undermining election integrity
2024-07-02 03:00

"As AI continues to advance and become more accessible, it is crucial that we prioritize fraud protection solutions powered by AI to protect the integrity of personal and institutional data-AI is the best defense against AI-enabled fraud attacks." 74% of US respondents agree that they would question the outcome of an election held online.