Security News

Bug or Feature? Hidden Web Application Vulnerabilities Uncovered
2023-12-15 11:08

Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot be exploited to operate out of bounds. Cannot initiate...

New Security Vulnerabilities Uncovered in pfSense Firewall Software - Patch Now
2023-12-15 11:02

Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could be chained by an attacker to execute arbitrary commands on...

To BCC or not to BCC – that is the question data watchdog wants answered
2023-12-15 09:59

A data regulator has reminded companies they need to take care while writing emails to avoid unintentionally blurting out personal data. As a reminder for any Reg readers living under rocks, using the "BCC" field means that recipients cannot see each other's email addresses - useful for a bulk email with a large mailing list.

Google's New Tracking Protection in Chrome Blocks Third-Party Cookies
2023-12-15 07:23

Google on Thursday announced that it will start testing a new feature called "Tracking Protection" starting January 4, 2024, to 1% of Chrome users as part of its efforts to deprecate third-party...

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks
2023-12-15 05:25

A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for New Kind of Network) as a communications...

Fortifying cyber defenses: A proactive approach to ransomware resilience
2023-12-15 05:00

Instead of investing time in formulating non-binding pledges rather than working on actionable solutions, the US Government should adopt a more proactive stance by directly procuring advanced cybersecurity tools. By spearheading the implementation, through investment and education, the government can set a powerful example for the private sector to follow, thereby reinforcing the nation's cyber infrastructure.

Multi-cloud computing offers benefits but makes IT far more complex
2023-12-15 04:30

"Multi-cloud computing offers huge benefits but makes IT far more complex," said Bernie Hoecker, partner, Enterprise Cloud Transformation leader, ISG. "Enterprises that have made the leap are adopting increasingly powerful tools to manage that complexity." Cloud observability platforms are increasingly essential as multi-cloud complexity increases, the report says.

CIOs shape long-term success with GenAI expertise
2023-12-15 04:00

Today's CIOs have evolved from managing IT infrastructure and ensuring systems' efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape organizational directions, create value, and boost revenue for the company. As they move their organizations toward the goal of becoming a digital business, they are grappling with pressing challenges such as optimizing IT investments, fortifying cybersecurity, and driving innovation through generative AI. IDC expects companies to expand their digital business capabilities further as they seek to gain competitive advantage and CIOs will play a crucial role in the success of these efforts.

Kraft Heinz investigates hack claims, says systems ‘operating normally’
2023-12-14 23:30

Kraft Heinz has confirmed that their systems are operating normally and that there is no evidence they were breached after an extortion group listed them on a data leak site. In a post to Snatch extortion group's data leak site dated August 16th, but not made visible until today, the threat actors claim that they breached Kraft Heinz.

New NKAbuse malware abuses NKN blockchain for stealthy comms
2023-12-14 22:15

A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat. NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain technology to manage resources and maintain a secure and transparent model for network operations.