Security News

Data from a breach that occurred five months ago involving Juspay, which handles payments for Amazon and other online retailers in India, has been dumped online, a researcher has found. Security researcher Rajshekhar Rajaharia discovered data of 35 million Indian credit-card holders from a breach of a Juspay server that occurred on Aug. 18, he revealed on Twitter.

Online users are more likely to reveal private information based on how website forms are structured to elicit data, Ben-Gurion University of the Negev researchers have determined. "The objective was to demonstrate that we are able to cause smartphone and PC users of online services to disclose more information by measuring the likelihood that they sign-up for a service simply by manipulating the way information items were presented," says Prof. Lior Fink, head of the BGU Behavioral Information Technologies Lab and a member of the Department of Industrial Management and Engineering.

A development build of Windows Core Polaris was leaked online yesterday, proving that Microsoft was actively developing the operating system designed for low-performance devices. For those unaware, Microsoft has been secretly working on a modular version of the Windows platform codenamed "Windows Core OS." With Windows Core OS, Microsoft planned to offer different flavors/SKUs of Windows for various form factors, such as phones, 2-in-1s, dual-screen PCs, and collaboration devices.

More than 45 million medical images - including X-rays and CT scans - are left exposed on unprotected servers, a CybelAngel report reveals. The analysts found that openly available medical images, including up to 200 lines of metadata per record which included PII and PHI, could be accessed without the need for a username or password.

More than 45 million medical images-and the personally identifiable information and personal healthcare information associated with them-have been left exposed online due to unsecured technology that's typically used to store, send and receive medical data, new research has found. NAS is an inexpensive storage solution used mainly by small companies or individuals to store data rather than paying for more expensive dedicated servers or virtual cloud servers, while DICOM is a global standard used by healthcare professionals to transmit medical images.

Two thousand servers containing 45 million images of X-rays and other medical scans were left online during the course of the past twelve months, freely accessible by anyone, with no security protections at all. Among the data - drawn from unprotected online storage devices with ties to hospitals and medical centres all over the planet - were 23,000 images of UK patients, left exposed to the public internet on 90 separate servers.

Cybersecurity firms Sophos and ReversingLabs on Monday jointly released the first-ever production-scale malware research dataset to be made available to the general public that aims to build effective defenses and drive industry-wide improvements in security detection and response. "SoReL-20M", as it's called, is a dataset containing metadata, labels, and features for 20 million Windows Portable Executable files, including 10 million disarmed malware samples, with the goal of devising machine-learning approaches for better malware detection capabilities.

83% of the top U.S. retailers have connections to a vulnerable third-party asset, and 43% have vulnerabilities that pose an immediate cybersecurity risk, Cyberpion reveals. "This holiday season is a perfect storm for the retail industry given increased e-commerce activity due to COVID-19, and the heavy reliance of retailers on third party providers of tracking, behavior, analytics and advertising services," said Cyberpion CRO Ran Nahmias.

Critical flaws in a core networking library powering Valve's online gaming functionality could have allowed malicious actors to remotely crash games and even take control over affected third-party game servers. "An attacker could remotely crash an opponent's game client to force a win or even perform a 'nuclear rage quit' and crash the Valve game server to end the game completely," Check Point Research's Eyal Itkin noted in an analysis published today.

Credit card stealer scripts are evolving and become increasingly harder to detect due to novel hiding tactics. This happened because scanners aren't commonly scanning CSS files for malicious code and anyone looking at the skimmer's trigger script reading a custom property from the CSS page wouldn't give it a second glance.