Security News

EU gave CrowdStrike the keys to the Windows kernel, claims Microsoft
2024-07-22 13:00

Did the EU force Microsoft to let third parties like CrowdStrike run riot in the Windows kernel as a result of a 2009 undertaking? This is the implication being peddled by the Redmond-based cloud and software titan. As the tech industry deals with the fallout from the CrowdStrike incident, Microsoft is facing questions.

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing
2024-07-22 12:26

A Latin America-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. The campaign involved the use of Google Cloud container URLs to host credential phishing pages with the aim of harvesting login information associated with Mercado Pago, an online payments platform popular in the LATAM region.

Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
2024-07-22 12:08

By now, most people are aware of – or have been personally affected by – the largest IT outage the world have ever witnessed, courtesy of a defective update for Crowdstrike Falcon Sensors that...

Two Russians sanctioned over cyberattacks on US critical infrastructure
2024-07-22 12:02

Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, named by the US government as CARR's leader and attacker-in-chief respectively, were designated for their alleged roles in attacks on US critical national infrastructure. Despite much of CARR's work since its inception in 2022 revolving around what the US Department of the Treasury describes as "Low-impact, unsophisticated DDoS attacks in Ukraine," the group was blamed for various attacks on US and European water facilities earlier this year.

How to Set up an Automated SMS Analysis Service with AI in Tines
2024-07-22 11:25

The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and enhance your organization's security posture is by building an automated SMS analysis service. Let's take a closer look at their SMS analysis workflow, which, like all of their pre-built workflows, is free to access and import, and can be used with a free Community Edition account.

#AI
Snake Mimics a Spider
2024-07-22 11:06

This is a fantastic video. It’s an Iranian spider-tailed horned viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the snake uses to fool passing birds looking for a meal.

MSPs & MSSPs: How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting
2024-07-22 10:41

As a vCISO, you are responsible for your client's cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently, we...

Surfshark vs CyberGhost (2024): Which VPN Is Better?
2024-07-22 10:26

Surfshark VPN. CyberGhost VPN. Our rating 4.6 / 5 4.3 / 5 Security protocols OpenVPN, WireGuard, IKEv2 OpenVPN, WireGuard, IKEv2 No. of servers $3,200 8,000-11,000+ VPN server locations 100 countries 100 countries Data breach monitoring Yes Yes Simultaneous device locations Unlimited 7 Free trial or free version Mobile free trial 24 hours for desktop; 3-7 days for mobile Starting price $2.79 per month $2.19 per month. For more on Surfshark and CyberGhost VPN, check out our full Surfshark review and full CyberGhost VPN review.

SocGholish Malware Exploits BOINC Project for Covert Cyberattacks
2024-07-22 06:45

The JavaScript downloader malware known as SocGholish is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC. BOINC, short for Berkeley Open Infrastructure Network Computing Client, is an open-source "Volunteer computing" platform maintained by the University of California with an aim to carry out "Large-scale distributed high-throughput computing" using participating home computers on which the app is installed. The JavaScript downloader, in this case, activates two disjointed chains, one that leads to the deployment of a fileless variant of AsyncRAT and the other resulting in the BOINC installation.

Cross-industry standards for data provenance in AI
2024-07-22 04:30

In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models' performance and reliability. Can you explain why data provenance is critical for AI trustworthiness and how it impacts AI models' overall performance and reliability?

#AI