Security News

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers
2024-01-22 11:22

Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts. The malware,...

52% of Serious Vulnerabilities We Find are Related to Windows 10
2024-01-22 11:22

We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we found. Digging into the data The dataset we analyze here is representative of a subset of clients...

Tietoevry ransomware attack halts Swedish organizations
2024-01-22 11:09

Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. "Tietoevry immediately isolated the affected platform, and the ransomware attack has not affected other parts of the company's infrastructure."

ICO fines spam slinging financial services biz
2024-01-22 11:00

A financial services company that illegally dispatched tens of thousands of spam messages promising to help the recipients magically wipe away their debts is itself now a debtor to the UK's data regulator. Free Debt Help can consolidate your unaffordable payments, write off up to 85 percent of your total debt Check if you qualify text HELP or Stop2Stop.

New method to safeguard against mobile account takeovers
2024-01-22 10:54

Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts. Dr Luca Arnaboldi from Birmingham's School of Computer Science worked with Professor David Aspinall from the University of Edinburgh, Dr Christina Kolb from the University of Twente, and Dr Sasa Radomirovic from the University of Surrey to define a way of cataloging security vulnerabilities and modeling account takeover attacks, by reducing them their constituent building blocks.

Safeguarding against the global ransomware threat
2024-01-22 09:51

Sponsored Feature Ransomware is used by cybercriminals to steal and encrypt critical business data before demanding payment for its restoration. Sterling Wilson, Data Resilience Strategist at Object First - the provider of Ootbi, the ransomware-proof backup storage appliance purpose-built for Veeam - believes that data is one of the most precious assets available, and as such, must be tightly protected.

FTC Bans InMarket for Selling Precise User Location Without Consent
2024-01-22 07:02

The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket Media from selling or licensing precise location data. The settlement is part of...

Without clear guidance, SEC’s new rule on incident reporting may be detrimental
2024-01-22 06:00

The SEC has instituted a set of guidelines "Requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance." These new guidelines went into effect on December 18, 2023, which means 2024 will be an important year for enterprises and how they adhere to current security regulations. Establishing a reporting infrastructure that sheds light on what, how, and when security incidents are disclosed is important for the industry at large and is a huge step toward having cybersecurity seen as a business-wide issue.

The reality of hacking threats in connected car systems
2024-01-22 05:30

The automotive industry faces new cybersecurity challenges as vehicles become more connected. One way they can do this is by keeping their vehicle's software updated and using strong passwords for any connected services to reduce the risks of connected cars.

CloudFoxable: Open-source AWS penetration testing playground
2024-01-22 05:00

CloudFoxable is a capture-the-flag style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts aiming to practice offensive security techniques safely.