Category: daily summary

IT Security News Daily Summary 2024-04-29

FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data Vulnerability Recap 4/29/24 – Cisco, Microsoft, Palo Alto & More Google prevented 2.28 million policy-violating apps from being published on Google Play in 2023 Congress Should Just Say No…

IT Security News Daily Summary 2024-04-28

ICICI Bank exposed credit card data of 17000 customers USENIX Security ’23 – SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes Hackers Claim to Have Infiltrated Belarus’ Main Security Service Deceptive npm Packages Employed to Deceive Software Developers into…

IT Security News Daily Summary 2024-04-27

USENIX Security ’23 – Beyond Typosquatting: An In-depth Look at Package Confusion Godfather Banking Trojan Multiplies, Spreading to 1.2K Variants in 57 Nations Hackers may have accessed thousands of accounts on the California state welfare platform Here’s How NFTs Can…

IT Security News Daily Summary 2024-04-26

Security review for Microsoft Edge version 124 USENIX Security ’23 – UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware Facebook Blasted By Regulators For Holding Onto Sensitive User Data For Too Long Kaiser Permanente handed over 13.4M people’s data…

IT Security News Daily Summary 2024-04-25

Ring dinged for $5.6M after, among other claims, rogue insider spied on ‘pretty girls’ AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry Rubrik’s shares end trading up almost 16% on the company’s public debut…

IT Security News Daily Summary 2024-04-24

IBM Cyber Security Report 2024 – New Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks IBM Cyber Security Report: Unveiling the Evolving Threat Landscape Driving fast or braking hard? Your connected car may be…

IT Security News Daily Summary 2024-04-23

Google ad for Facebook redirects to scam HHS Strengthens Privacy of Reproductive Health Care Data Dutch Government Might Leave Facebook Over Privacy Concerns $10 Million Bounty on Iranian Hackers for Cyber Attacks on US Gov, Defense Contractors North Korea-linked APT…

IT Security News Daily Summary 2024-04-22

Facebook AI Makes Creepy Comment That It Has A Gifted, Disabled Child Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw U.S. Senate and Biden Administration Shamefully Renew and Expand FISA Section 702, Ushering in a Two Year…

IT Security News Daily Summary 2024-04-21

Akira ransomware received $42M in ransom payments from over 250 victims DuneQuixote campaign targets the Middle East with a complex backdoor Cyberattackers Employ Elusive “CR4T” Backdoor to Target Middle Eastern Governments New AI Speed Cameras Record Drivers on Their Phones…

IT Security News Daily Summary 2024-04-20

What is Mobile Application Security Testing? Explained USENIX Security ’23 – PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information A French hospital was forced to reschedule procedures after cyberattack GenAI Presents a Fresh Challenge for SaaS Security Teams…

IT Security News Daily Summary 2024-04-19

Your Android phone could have stalkerware — here’s how to remove it Friday Squid Blogging: Squid Trackers Google Consolidates DeepMind And AI Research Teams Sacramento airport goes no-fly after AT&T internet cable snipped More on the PAN-OS CVE-2024-3400 PRODUCT REVIEW:…

IT Security News Daily Summary 2024-04-18

‘ASTORS’ Champion Adds Passphrase Generator to Keeper Web Vault Two Years Post-Roe: A Better Understanding of Digital Threats Vulnerabilities for AI and ML Applications are Skyrocketing Data Matters ? The Value of Visibility in API Security What to Consider When…

IT Security News Daily Summary 2024-04-17

Facebook’s Controversial “Consent Or Pay” Privacy Model Officially Shot Down Should you share your location with your partner? Kapeka: A New Backdoor in Sandworm’s Arsenal of Aggression Big Tech Says Spy Bill Turns Its Workers Into Informants Kremlin’s Sandworm blamed…

IT Security News Daily Summary 2024-04-16

Palo Alto Networks GlobalProtect exploit public and widely exploited CVE-2024-3400, (Tue, Apr 16th) Simeio Returns to Compete in 2024 ‘ASTORS’ Awards with Simeio OI ShadowRay Vulnerability: 6 Lessons for AI & Cybersecurity MGM says FTC can’t possibly probe its ransomware…

IT Security News Daily Summary 2024-04-15

4 types of cloud security tools organizations need in 2024 Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits Cisco Duo warns telephony supplier data breach exposed MFA SMS logs D3 Security at RSAC 2024: Streamline Your Security Operations with…

IT Security News Daily Summary 2024-04-14

Facebook Testing Tools To Auto-Blur Nudity In Teens’ DMs Deciphering Metrics: From NCAA Women’s Basketball to Cyber Trends USENIX Security ’23 – How to Bind Anonymous Credentials to Humans Apple Alerts iPhone Users of ‘Mercenary Attack’ Threat Canadian retail chain…

IT Security News Daily Summary 2024-04-13

Crooks manipulate GitHub’s search results to distribute malware ISC Stormcast For Sunday, April 14th, 2024 https://isc.sans.edu/podcastdetail/8938, (Sat, Apr 13th) What is Web Application Security Testing? BatBadBut flaw allowed an attacker to perform command injection on Windows Offensive Security Necessitates a…

IT Security News Daily Summary 2024-04-12

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls Rust gets security fix for Windows vulnerability Pros and cons of 7 breach and attack simulation tools Roku disclosed a new security breach impacting 576,000 accounts Google One VPN axed…

IT Security News Daily Summary 2024-04-11

2024 Cybersecurity Excellence Awards – Extended Deadline Locking down container security once and for all with Rust-based Edera DuckDuckGo’s Privacy Pro bundles a VPN with personal data removal and identity theft restoration Why CISA is Warning CISOs About a Breach…

IT Security News Daily Summary 2024-04-10

fraud detection Maryland State Passes Two Major Privacy Bills To Stop Facebook Data Gathering Trump Loyalists Kill Vote on US Wiretap Program AT&T states that the data breach impacted 51 million former and current customers It’s 2024 and Intel silicon…

IT Security News Daily Summary 2024-04-09

Is My VPN Working? How to Test for VPN Leaks VERT Threat Alert: April 2024 Patch Tuesday Analysis April’s Patch Tuesday Brings Record Number of Fixes Section 702: The Future of the Biggest US Spy Program Hangs in the Balance…

IT Security News Daily Summary 2024-04-08

Greylock McKinnon Associates data breach exposed DOJ data of 341650 people Hashicorp Versus OpenTofu Gets Ugly US insurers use drone photos to deny home insurance policies Facebook Accused Of Censoring Small Newspaper That Criticized It Leveraging Cloud Native Technologies in…

IT Security News Daily Summary 2024-04-07

A Breakthrough Online Privacy Proposal Hits Congress Conn. CISO Raises Security Concerns Over BadGPT, FraudGPT Privnote Secure Messaging App Is Under Phishing Threat US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked The Growing Threat of Remote Desktop Protocol…

IT Security News Daily Summary 2024-04-06

US Cancer Patient Data Breach Affected 800000 Patients Records Insights into Recent Malware Attacks: Key Learnings and Prevention Strategies AI Developed to Detect Invasive Asian Hornets More than 16,000 Ivanti VPN gateways still vulnerable to RCE CVE-2024-21894 Bing Ad Posing…

IT Security News Daily Summary 2024-04-05

Magento flaw exploited to deploy persistent backdoor hidden in XML Friday Squid Blogging: SqUID Bots Salt Security Applies Generative AI to API Security Anyscale addresses critical vulnerability on Ray framework — but thousands were still exposed Beware the Blur: Phishing…

IT Security News Daily Summary 2024-04-04

Google survey: 63% of IT and security pros believe AI will improve corporate cybersecurity The Power of AI Assistants and Advanced Threat Detection 2024-04-04: Koi Loader/Stealer activity Google Patches Pixel Phone Zero-days After Exploitation by Ransomware attacks ravaged municipal governments…

IT Security News Daily Summary 2024-04-03

Google addressed another Chrome zero-day exploited at Pwn2Own in March Smart Traffic Signals Security in the Era of AI and Smart Cars Google patches critical vulnerability for Androids with Qualcomm chips Want to keep getting Windows 10 updates next year?…

IT Security News Daily Summary 2024-04-02

3 UK Cyber Security Trends to Watch in 2024 How to Escape the 3 AM Page as a Kubernetes Site Reliability Engineer A Deep Dive on the xz Compromise Defending against IoT ransomware attacks in a zero-trust world Open source…

IT Security News Daily Summary 2024-04-01

Banks in Singapore begin sharing data to combat financial crime The Incognito Mode Myth Has Fully Unraveled 2024 State of Malware in Education report: Top 6 cyberthreats facing K-12 and Higher Ed Malicious xz backdoor reveals fragility of open source…

IT Security News Daily Summary 2024-03-31

PyPI Halts New User Registrations to Combat Malware Campaign XZ Utils backdoor update: Which Linux distros are affected and what can you do? Checking CSV Files, (Sun, Mar 31st) Security Affairs newsletter Round 465 by Pierluigi Paganini – INTERNATIONAL EDITION…

IT Security News Daily Summary 2024-03-30

Understanding and Mitigating the Fedora Rawhide Vulnerability (CVE-2024-3094) Lateral Movement in Cybersecurity: Sneaking Sideways Through a Network Technologist Versus Spy: The xz Backdoor Debate AT&T Says PII From 73 Million Account Holders Leaked Onto Dark Web Expert found a backdoor…

IT Security News Daily Summary 2024-03-29

Malicious backdoor sneaks into xz, Linux world’s data compression library and tool U.S. Supreme Court Does Not Go Far Enough in Determining When Government Officials Are Barred from Censoring Critics on Social Media Easy-to-use make-me-root exploit lands for recent Linux…

IT Security News Daily Summary 2024-03-28

SydeLabs raises $2.5M seed to develop an intent-based firewall guard for AI New iMessage Phishing Campaign Targets Postal Service Users Globally Activision investigating password-stealing malware targeting game players Go Big & Go Chrome: Strengthen Cybersecurity in Education, the Enterprise &…

IT Security News Daily Summary 2024-03-27

Apple fans flooded with phony password reset requests ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024…

IT Security News Daily Summary 2024-03-26

TheMoon bot infected 40,000 devices in January and February ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 The foundation for responsible analytics with Microsoft Purview Facebook snooped on users’ Snapchat traffic in…

IT Security News Daily Summary 2024-03-25

Chinese nationals charged with cyber-spying on US biz and more for Beijing Constella and Social Links Join Forces to Deliver Transformative OSINT Solutions How to Get the Most From Your Secrets Scanning CISA adds FortiClient EMS, Ivanti EPM CSA, Nice…

IT Security News Daily Summary 2024-03-24

Some 300,000 IPs vulnerable to this Loop DoS attack Controversy Surrounds Flipper Zero Amid Car Theft Concerns Security Affairs newsletter Round 464 by Pierluigi Paganini – INTERNATIONAL EDITION USENIX Security ’23 – Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao,…

IT Security News Daily Summary 2024-03-23

Windows Server 2012 / 2012 R2 End of Life – Here’s How to Secure your Legacy Servers Russia-linked APT29 targeted German political parties with WINELOADER backdoor Will AI augment or annex cybersecurity jobs? Cyber Extortion Stoops Lowest: Fake Attacks, Whistleblowing,…

IT Security News Daily Summary 2024-03-22

Unsaflok flaws allow to open millions of doors using Dormakaba Saflok electronic locks Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks Empowering Developers With Scalable, Secure, and Customizable Storage Solutions Chinese snoops use F5,…

IT Security News Daily Summary 2024-03-21

Role-Based Multi-Factor Authentication Transforming communities, one drop of water at a time Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild FBI v the bots: Feds urge denial-of-service defense after critical infrastructure alert Apple’s iMessage Encryption Puts Its Security…

IT Security News Daily Summary 2024-03-20

Users say Glassdoor added real names to user profiles without their consent OpenAI’s GPT store is brimming with promise – and spam The best VPN routers of 2024 How to defend against phishing as a service and phishing kits Introducing…

IT Security News Daily Summary 2024-03-19

This Acoustic Side-Channel Attack Steals Keystrokes Via Typing Patterns Pro Players Hacked Live On Stream! Apex Legends Tournament Postponed Pokemon resets some users passwords after hacking attempts Ukraine cyber police arrested crooks selling 100 million compromised accounts Daniel Stori’s ‘I’m…

IT Security News Daily Summary 2024-03-18

Mintlify says customer GitHub tokens exposed in data breach Don’t be like these 900+ websites and expose millions of passwords via Firebase PoC exploit for critical RCE flaw in Fortra FileCatalyst transfer tool released Fujitsu Scrambles After Malware Attack: Customer…

IT Security News Daily Summary 2024-03-17

Threat actors leaked 70,000,000+ records allegedly stolen from AT&T USENIX Security ’23 – Tanusree Sharma, Zhixuan Zhou, Andrew Miller, Yang Wang – A Mixed-Methods Study Of Security Practices Of Smart Contract Developers 10 Takeaways from the 2024 Gartner IAM Summit…

IT Security News Daily Summary 2024-03-15

Navigating Certificate Lifecycle Management (CLM) and Mobile Device Management (MDM) With an Effective PKI Solution 5 Best VPNs for Travel in 2024 (Free & Paid VPNs) Simplify DNS Policy Management With New Umbrella Tagging APIs Satellites for quantum communications Lawmakers…

IT Security News Daily Summary 2024-03-14

​​Microsoft named as a Leader in three IDC MarketScapes for Modern Endpoint Security 2024 Recent DarkGate campaign exploited Microsoft Windows zero-day Making the Law Accessible in Europe and the USA JetBrains, Rapid7 clash over vulnerability disclosure policies CEO of Data…

IT Security News Daily Summary 2024-03-13

Feds seek attestation on secure software Malwarebytes Premium blocks 100% of malware during external AVLab test Facebook VR Headsets Are Vulnerable To “Inception-Style” Hack Edgeless Systems Brings Confidential Computing to AI LockBit Affiliate Sentenced to 4 Years in Canada, Faces…

IT Security News Daily Summary 2024-03-12

Congress Must Stop Pushing Bills That Will Benefit Patent Trolls Tweaks Stealer Targets Roblox Users Through YouTube and Discord Microsoft Patch Tuesday security updates for March 2024 fixed 59 flaws Sophos: Remote ransomware attacks on SMBs increasing Facebook And Instagram…

IT Security News Daily Summary 2024-03-11

Understanding the basics of Windows 365 Government Four things we learned when US spy chiefs testified to Congress Kremlin accuses America of plotting cyberattack on Russian voting systems Data brokers admit they’re selling information on precise location, kids, and reproductive…

IT Security News Daily Summary 2024-03-10

Are We Experiencing the End of Biometrics? OWASP Mobile Top 10 Lists For 2024 GenAI Regulation: Why It Isn’t One Size Fits All Apple iOS and iPadOS Memory Corruption Vulnerabilities: A Critical Alert USENIX Security ’23 – Jialai Wang, Ziyuan…

IT Security News Daily Summary 2024-03-09

Hacker Claims Breaching US Federal Contractor Acuity, Selling ICE, USCIS Data Seamless Integration: Connecting AWS Lambda to RDS and Writing Data Effortlessly CISA adds JetBrains TeamCity bug to its Known Exploited Vulnerabilities catalog Safeguarding the Code That Drives Modern Vehicles…

IT Security News Daily Summary 2024-03-08

Friday Squid Blogging: New Plant Looks Like a Squid Four Reasons to Protect the Internet this International Women’s Day Four Infosec Tools for Resistance this International Women’s Day Four Actions You Can Take To Protect Digital Rights this International Women’s…

IT Security News Daily Summary 2024-03-07

2023 FBI Internet Crime Report reported cybercrime losses reached $12.5 billion in 2023 We’re not Meta support: State AGs tell Zuck to fix rampant account takeover problem Victory! EFF Helps Resist Unlawful Warrant and Gag Order Issued to Independent News…

IT Security News Daily Summary 2024-03-06

Healthcare Groups Push for Help in Wake of Ransomware Attack on Change A Comprehensive Guide To Prototyping PCB Assembly FBI: Critical infrastructure suffers spike in ransomware attacks How NIST CSF 2.0 Can Help Schools USENIX Security ’23 – Wai Man…

IT Security News Daily Summary 2024-03-05

VMware urgent updates addressed Critical ESXi Sandbox Escape bugs Self-Replicating AI Malware is Here😱 #ComPromptMized Executive leadership changes to drive innovation, simplicity, and growth Self-Replicating AI Malware is Here😱 #ComPromptMized Report Uncovers Massive Sale of Compromised ChatGPT Credentials Self-Replicating AI…

IT Security News Daily Summary 2024-03-04

Epic Games ‘hackers’ admit threat of leak was phony Voting No on Prop E Is Easy and Important for San Francisco Secure Your API With These 16 Practices With Apache APISIX (Part 2) White House Recommends Memory-Safe Programming Languages and…

IT Security News Daily Summary 2024-03-03

USENIX Security ’23 – Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper – CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot 8 Tips To Protect Your Organization in the Evolving SaaS Landscape 4 strategies data-driven CISOs need…

IT Security News Daily Summary 2024-03-02

USENIX Security ’23 – Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem Microsoft Copilot for Finance: Transforming Financial Workflows with AI Precision GitHub Vulnerability Exposes Millions to RepoJacking…

IT Security News Daily Summary 2024-03-01

NIST Cybersecurity Framework: A Cheat Sheet for Professionals Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered Air National Guardsman Teixeira to admit he was Pentagon files leaker USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key…

IT Security News Daily Summary 2024-02-29

Fulton County, Security Experts Call LockBit’s Bluff Researchers found a zero-click Facebook account takeover ALPHV Blackcat, GCP-Native Attacks, Bandook RAT, NoaBot Miner, Ivanti Secure Vulnerabilities, and More: Hacker’s Playbook Threat Coverage Round-up: February 2024 A leaky database spilled 2FA codes…

IT Security News Daily Summary 2024-02-28

Speedify VPN Free vs. Premium: Which Plan Is Right For You? Best Secure Access Service Edge Platforms in 2024 High-risk open source vulnerabilities on the rise, Synopsys reports Wireless and the CiscoLive Network Operations Center Navigating the Waters of Generative…

IT Security News Daily Summary 2024-02-27

USENIX Security ’23 – ClepsydraCache – Preventing Cache Attacks with Time-Based Evictions Synopsys Report Exposes Extent of Open Source Software Security Risks Black Basta and Bl00dy ransomware gangs exploit recent ConnectWise ScreenConnect bugs EFF to D.C. Circuit: The U.S. Government’s…

IT Security News Daily Summary 2024-02-26

Latest Research Reveals Rise in API Attacks in 2023, Putting Businesses at Risk in 2024 Malicious Packages in npm, PyPI Highlight Supply Chain Threat From Indiana Jones to Cybersecurity: The Inspiring Journey of Devin Nevada sues to deny kids access…

IT Security News Daily Summary 2024-02-25

Safeguarding Children in the Era of Big Data Securing Space Infrastructure for US And Allied Collaboration Understand Cyber Insurance: Rising Risks and How to Right-Size Policies Cell Service Restored Following Extensive AT&T Outage A cyber attack hit the Royal Canadian…

IT Security News Daily Summary 2024-02-24

A Vending Machine Error Revealed Secret Face Recognition Tech White House Wades Into Debate on ‘Open’ Versus ‘Closed’ Artificial Intelligence Systems USENIX Security ’23 – Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen – CarpetFuzz: Automatic Program Option Constraint Extraction…

IT Security News Daily Summary 2024-02-23

Hackers Leak 2.5M Private Plane Owners’ Data Linked to LA Intl. Airport Breach Microsoft released red teaming tool PyRIT for Generative AI EFF Urges Ninth Circuit to Reinstate X’s Legal Challenge to Unconstitutional California Content Moderation Law February 2024 Web…

IT Security News Daily Summary 2024-02-22

Identify Weak Links in Your Application Stack – Part 2, Anomaly Detection Cyberattack downs pharmacies across America USENIX Security ’23 – Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen – FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler…

IT Security News Daily Summary 2024-02-21

Discord took no action against server that coordinated costly Mastodon spam attacks Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT…

IT Security News Daily Summary 2024-02-20

ConnectWise fixed critical flaws in ScreenConnect remote access tool Menlo Security Adds SaaS Platform to Manage Secure Browsers Vulnerability Summary for the Week of February 12, 2024 U.S. Joins U.K. to Seize LockBit Site, Disrupt Massive Ransomware Variant Authentic or…

IT Security News Daily Summary 2024-02-19

Do you need antivirus on Linux? Wyze camera breach let 13,000 strangers look into other people’s homes Anatsa Android banking Trojan expands to Slovakia, Slovenia, and Czechia Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt NSO Group…

IT Security News Daily Summary 2024-02-18

Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data Corporate Accountability: Tech Titans Address the Menace of Misleading AI in Elections Changing How Healthcare Works: Big News in Communication ESET fixed high-severity local privilege escalation bug in…

IT Security News Daily Summary 2024-02-17

USENIX Security ’23 – Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li – Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization How…

IT Security News Daily Summary 2024-02-16

Friday Squid Blogging: Vegan Squid-Ink Pasta OpenAI’s Sora Generates Photorealistic Videos 6 Best Intrusion Detection & Prevention Systems for 2024 Reviewed New York City Sues Facebook For Allegedly Harming Kids State Government Organization Network Breach: SafeBreach Coverage for US-CERT Alert…

IT Security News Daily Summary 2024-02-15

Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act Feds dismantle Russian GRU botnet built on 1,000-plus home, small biz routers FBI Shuts Down Warzone RAT; Cybercriminals Arrested Feds Disrupt Botnet Used by Russian APT28 Hackers…

IT Security News Daily Summary 2024-02-14

Menlo Security report: Cybersecurity risks surge with AI adoption Microsoft, OpenAI warn nation-state hackers are abusing LLMs 200,000 Facebook Marketplace User Records Leaked Online Abusing the Ubuntu ‘command-not-found’ utility to install malicious packages C can be memory safe, part 2…

IT Security News Daily Summary 2024-02-13

How AI is strengthening XDR to consolidate tech stacks IBM, ISC2 Offer Free Cybersecurity Certificate Fat Patch Tuesday, February 2024 Edition Don’t Understand RADIUS and TACACS+? Cisco has You Covered A ransomware attack took 100 Romanian hospitals down JFK Airport…

IT Security News Daily Summary 2024-02-12

US Takes Down Notorious Warzone RAT Malware Operation, Arrests 2 Hackers uncover new TheTruthSpy stalkerware victims: Is your Android device compromised? 5 reasons why I use Firefox when I need the most secure web browser CISA warns Fortinet zero-day vulnerability…

IT Security News Daily Summary 2024-02-11

Raspberry Robin spotted using two new 1-day LPE exploits USENIX Security ’23 – Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor – Are Consumers Willing to Pay for Security and Privacy of IoT Devices? The Impact of Open-Source Software…

IT Security News Daily Summary 2024-02-10

CISA adds Fortinet FortiOS bug to its Known Exploited Vulnerabilities catalog Mozilla Firefox’s Premium Dark Web Monitoring Solution Smart Helmets Flaw Exposed Millions to Risk of Hacking and Surveillance More than 800 False “Temu” Domains Trick Customers Into Losing Their…

IT Security News Daily Summary 2024-02-09

Friday Squid Blogging: A Penguin Named “Squid” Shim vulnerability exposes most Linux systems to attack Apple defends parts pairing as Oregon mulls right-to-repair bill cyberterrorism Ivanti discloses fifth vulnerability, doesn’t credit researchers who found it Tax Season Alert: Common scams…

IT Security News Daily Summary 2024-02-08

Critical Vulnerability Could Allow Mastodon Account Takeover The Linux Foundation and its partners are working on cryptography for the post-quantum world US offers $10 million reward for info on Hive ransomware group leaders Fake LastPass lookalike made it into Apple…

IT Security News Daily Summary 2024-02-07

Google will block Android users from installing ‘unsafe’ apps in fraud protection test Info-Tech report outlines 5 GenAI initiatives CIOs must key in on China group may have been hiding in IT networks for five years, says Five Eyes warning…

IT Security News Daily Summary 2024-02-06

How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages Patch Management and Container Security MuleSoft unveils policy development kit for API gateway Confirmed: Entrust is buying AI-based ID verification startup Onfido, sources say for more than…

IT Security News Daily Summary 2024-02-05

Enpass Review 2024: Pricing, Features, Pros, & Cons Clorox counts the cost of cyberattack The Trusted Liquid Workforce The Journey to CCDE, a Personal Story Ivanti devices hit by wave of exploits for latest security hole US to Roll Out…

IT Security News Daily Summary 2024-02-04

Facebook Whistleblower Says Hearing With Zuckerberg Could Signal Big Change For User Privacy Thousands of Stolen AnyDesk Login Credentials Sold on Dark Web Thousands of Stolen AnyDesk Logins Credentials Sold on Dark Web How to detect poisoned data in machine…

IT Security News Daily Summary 2024-02-03

Clorox estimates the costs of the August cyberattack will exceed $49 Million WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols The Role of DevOps in Enhancing the Software Development Life Cycle FIRST Launched CVSS 4.0, Revolutionizing Cybersecurity Assessment and…

IT Security News Daily Summary 2024-02-02

Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees’ Hardware San Francisco Police’s Live Surveillance Yields Almost 200 Hours of Spying–Including of Music Festivals Taylor Swift is not the first victim of AI: Decoding the deepfake dilemma Botnet…

IT Security News Daily Summary 2024-02-01

Anonymous Sudan Claims DDOS Attacks on UAE’s Flydubai Airline The Mystery of the $400 Million FTX Heist May Have Been Solved Facebook Founder Zuckerberg Appears Before Congress And Apologizes For Harm To Children The $400 Million FTX Heist Mystery May…

IT Security News Daily Summary 2024-01-31

Facebook Approves Pro-Anorexia And Drug Ads Made With Its Own AI Tool Crooks stole around $112 million worth of XRP from Ripple’s co-founder Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available The Web Scraping Problem: Part 1 How Akamai…

IT Security News Daily Summary 2024-01-30

The Taylor Swift deepfake porn is nothing new – but that doesn’t mean we shouldn’t be concerned The WordPress 6.4.3 Security Update – What You Need to Know Top 7 Cloud Storage Security Issues & Risks (+ Mitigations) Lawmaker Sues…

IT Security News Daily Summary 2024-01-29

10 reasons why securing software supply chains needs to start with containers The best identity theft protection and credit monitoring services of 2024 Apple Begins 2024 Patching A Zero-Day Under Attack Facebook Among The Worst At Collecting Data From Apps…

IT Security News Daily Summary 2024-01-28

Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Crypto Stealing PyPI Malware Hits Both Windows and Linux Users Failing Upwards (or not) (Pt1) Failing Upwards: Put on your own…

IT Security News Daily Summary 2024-01-27

TPM Chips and the Use of TPM in Virtualization Technology Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe How Kratikal Helps Businesses Prevent Cyber Attacks? This Side of AI Might Not Be What You…

IT Security News Daily Summary 2024-01-26

Generative AI’s enterprise gamble: IT leaders bet big on tech despite security woes Shift-left Convergence with Generative AI Improves the Programmer’s Role Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs What is DMARC? Hackers Crack Tesla Twice, Rake…

IT Security News Daily Summary 2024-01-25

HP Claims Monopoly on Ink, Alleges 3rd-Party Cartridge Malware Risk Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight Yearly Intel Trend Review: The 2023 RedSense report San Francisco: Vote No on Proposition E to Stop Police from…

IT Security News Daily Summary 2024-01-24

NCSC says AI will increase ransomware, cyberthreats Global ransomware threat expected to rise with AI, U.K. cyber authority warns Patch management needs a revolution, part 3: Vulnerability scores and the concept of trust Enabling Peer Pods on IBM Z and…

IT Security News Daily Summary 2024-01-23

Cybercrime’s Silent Operator: The Unraveling of VexTrio’s Malicious Network Empire CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive Google Chrome adds new AI features to boost productivity and creativity Uncovering the hidden superpowers of your smartphone Mother of All Breaches: 26…

IT Security News Daily Summary 2024-01-22

Facebook Will Now Let European Users Unlink Their Data Across Platforms The best VPN for streaming in 2024: Expert tested and reviewed Update your iPhone and turn on Stolen Device Protection ASAP. Here’s why Microsoft breached by Russian APT behind…

IT Security News Daily Summary 2024-01-21

USENIX Security ’23 – Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner – Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality Evolution of AI Assistants: Navigating Breakthroughs in Software Development LockBit ransomware gang claims…

IT Security News Daily Summary 2024-01-20

Microsoft Executives’ Emails Breached by Russia Hackers DHS and FBI: Chinese Drones Pose Major Threat to U.S. Security Fujitsu Bugs That Sent Innocent People to Prison Were Known ‘From the Start’ USENIX Security ’23 – Unique Identification of 50,000+ Virtual…