Security News

Pandabuy confirms crooks nabbed data on 1.3M punters
2024-04-02 16:30

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Russia charges suspects behind theft of 160,000 credit cards
2024-04-02 15:37

Russia's Prosecutor General's Office has announced the indictment of six suspected "Hacking group" members for using malware to steal credit card and payment information from foreign online stores. According to investigations, the six suspects started the malicious activity nearly seven years ago and managed to steal over 160,000 payment cards.

Microsoft warns deepfake election subversion is disturbingly easy
2024-04-02 15:00

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

New XZ backdoor scanner detects implant in any Linux binary
2024-04-02 14:33

Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094. Late last month, Microsoft engineer Andres Freud discovered the backdoor in the latest version of the XZ Utils package while investigating unusually slow SSH logins on Debian Sid, a rolling release of the Linux distribution.

Rubrik files to go public following alliance with Microsoft
2024-04-02 13:30

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
2024-04-02 13:18

The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating remote code execution, a new analysis...

Top 6 Passwordless Authentication Solutions for 2024
2024-04-02 12:43

Passwordless authentication solutions are often components of larger identity and access management platforms offering capabilities like password management, single sign-on and multi-factor authentication. Top passwordless authentication solutions comparison.

AT&T data leaked: 73 million customers affected
2024-04-02 12:20

AT&T has confirmed that the data set leaked on the dark web some two weeks ago does contain "AT&T data-specific fields".According to AT&T, the batch includes data of approximately 7.6 million current AT&T account holders and approximately 65.4 million former account holders: full name, email address, mailing address, phone number, social security number, date of birth, AT&T account number and passcode.

Polish officials may face criminal charges in Pegasus spyware probe
2024-04-02 12:00

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Harnessing the Power of CTEM for Cloud Security
2024-04-02 11:27

Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of data breaches were against public, private, or hybrid cloud environments....