Security News > 2024 > August

Remote Work: A Ticking Time Bomb Waiting to be Exploited
2024-08-26 14:01

ThreatLocker has created a list of the top 15 actions to secure an organization if employing a remote or hybrid workforce. Learn more in this free e-book from ThreatLocker. [...]

Seattle-Tacoma Airport IT systems down due to a cyberattack
2024-08-26 13:09

The Seattle-Tacoma International Airport has confirmed that a cyberattack is likely behind the ongoing IT systems outage that disrupted reservation check-in systems and delayed flights over the...

31.5M invoices, contracts, patient consent forms, and more exposed to the internet
2024-08-26 13:00

Unprotected database with 12 years of biz records yanked offline Exclusive Nearly 2.7 TB of sensitive data — 31.5 million invoices, contracts, HIPPA patient consent forms, and other business...

US Federal Court Rules Against Geofence Warrants
2024-08-26 11:05

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary—are unconstitutional. The...

#US
CyberGhost vs NordVPN (2024): Which VPN Should You Choose?
2024-08-26 11:00

While CyberGhost VPN’s optimized servers bring a lot of value, NordVPN’s more consistent speed performance and extensive feature inclusions give it the slight edge.

Cognizant alleges Infosys swiped its trade secrets
2024-08-26 11:00

Sueball suggests outsourcer went out of bounds by developing competing product A subsidiary of IT outsourcer Cognizant filed a lawsuit on Friday in Texas federal court alleging that rival Infosys...

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms
2024-08-26 10:31

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to...

Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration
2024-08-26 10:31

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case...

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks
2024-08-26 07:45

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution...

New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards
2024-08-26 04:46

Cybersecurity researchers have uncovered new Android malware that can relay victims' contactless payment data from physical credit and debit cards to an attacker-controlled device with the goal of...