Security News
The cybercriminals behind the ransomware known as Maze claim to have breached the systems of LG Electronics and obtained highly sensitive information. The operators of the Maze ransomware are known for targeting major organizations and not only encrypting their files, but also stealing files and threatening to make them public unless a ransom is paid.
The US is protected by what's known as a nuclear triad: a three-pronged attack force that consists of land-launched nuclear missiles, nuclear missiles on submarines, and aircraft equipped with nuclear bombs and missiles. One of the triad's legs - the land-based LGM-30 Minuteman intercontinental ballistic missile - has been kicked by hackers who've inflicted Maze ransomware on the computer network of a Northrup Grumman contractor.
Six Cisco-operated servers were hacked via SaltStack security vulnerabilities, the networking giant revealed this week. The compromised systems act as the salt-master servers for releases 1.2 and 1.3 of Cisco's Virtual Internet Routing Lab Personal Edition product, and customer installations connect to these Cisco-maintained backend boxes.
Mitron is not really a 'Made in India' product, and the viral app contains a highly critical, unpatched vulnerability that could allow anyone to hack into any user account without requiring interaction from the targeted users or their passwords. Popped out of nowhere, Mitron is not owned by any big company, but the app went viral overnight, capitalizing on its name that is popular in India as a commonly used greeting by Prime Minister Narendra Modi.
Mitron is not really a 'Made in India' product, and the viral app contains a highly critical, unpatched vulnerability that could allow anyone to hack into any user account without requiring interaction from the targeted users or their passwords. Popped out of nowhere, Mitron is not owned by any big company, but the app went viral overnight, capitalizing on its name that is popular in India as a commonly used greeting by Prime Minister Narendra Modi.
On Friday, ProPublica and The Atlanta Journal-Constitution revealed that the Georgia Bureau of Investigation found "No evidence of damage to network or computers, and no evidence of theft, damage, or loss of data." Kemp's hacking claim followed a report from a voter with software development experience about access control vulnerabilities in the state's My Voter Page and its online voter registration system.
On Friday, ProPublica and The Atlanta Journal-Constitution revealed that the Georgia Bureau of Investigation found "No evidence of damage to network or computers, and no evidence of theft, damage, or loss of data." Kemp's hacking claim followed a report from a voter with software development experience about access control vulnerabilities in the state's My Voter Page and its online voter registration system.
Now, Cisco reveals that salt-master servers that are used with Cisco Virtual Internet Routing Lab Personal Edition were upgraded on May 7, and that, on the same day, they were found to have been compromised through the aforementioned vulnerabilities. "Cisco identified that the Cisco maintained salt-master servers that are servicing Cisco VIRL-PE releases 1.2 and 1.3 were compromised. The servers were remediated on May 7, 2020," the company announced in an advisory.
In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.
While some tweets taking aim at Houseparty appear to be dubious, evidence of any smear campaign has yet to surface, and it appears the $1m bounty has not been awarded. The Register twice asked Houseparty to confirm this.