Security News

Overcoming GenAI challenges in healthcare cybersecurity
2024-04-25 04:00

What are the key cybersecurity challenges in healthcare in the context of GenAI, and how can they be effectively addressed? How do you see GenAI transforming healthcare operations and patient care, especially regarding efficiency and decision-making?

25 cybersecurity AI stats you should know
2024-04-25 03:30

Today, enterprises block 18.5% of all AI transactions, a 577% increase from April to January, for a total of more than 2.6 billion blocked transactions. AI tools put companies at risk of data exfiltration.

73% of SME security pros missed or ignored critical alerts
2024-04-25 03:00

Small and medium-sized enterprises IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company's security posture, according to Coro. According to the survey, 73% of SME security professionals have missed, ignored or failed to act on critical security alerts, with respondents noting a lack of staff and a lack of time as the top two reasons.

Australia’s spies and cops want ‘accountable encryption’ - aka access to backdoors
2024-04-25 00:29

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes
2024-04-24 23:11

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

US charges Samourai cryptomixer founders for laundering $100 million
2024-04-24 20:55

Keonne Rodriguez and William Lonergan Hill have been charged by the U.S. Department of Justice for laundering more than $100 million from various criminal enterprises through Samourai, a cryptocurrency mixer service they ran for nearly a decade. In addition to crypto mixing services, Samourai also offered a service called "Ricochet," which allowed users to send cryptocurrency using additional and unnecessary intermediate transactions to thwart law enforcement and crypto exchange efforts to track funds sourced from criminal activity.

Maximum severity Flowmon bug has a public exploit, patch now
2024-04-24 20:08

Proof-of-concept exploit code has been released for a top-severity security vulnerability in Progress Flowmon, a tool for monitoring network performance and visibility. The security issue has the maximum severity score of 10/10 and was discovered by researchers at Rhino Security Labs.

Shouldn't Teams, Zoom, Slack all interoperate securely for the Feds? Wyden is asking
2024-04-24 19:43

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
2024-04-24 18:26

A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances used on government networks across the globe and use two zero-day vulnerabilities to install backdoors on them, Cisco Talos researchers have shared on Wednesday."On a compromised ASA, the attackers submit shellcode via the host-scan-reply field, which is then parsed by the Line Dancer implant. The host-scan-reply field, typically used in later parts of the SSL VPN session establishment process, is processed by ASA devices configured for SSL VPN, IPsec IKEv2 VPN with 'client-services' or HTTPS management access," the researchers explained.

Microsoft cannot keep its own security in order, so what hope for its add-ons customers?
2024-04-24 17:15

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.