Business social network LinkedIn has announced they are to suspend the use of UK user data for training their artificial intelligence models. The decision comes… The post LinkedIn suspends some AI training operations appeared first on Panda Security Mediacenter. This…
Hacker Arrested for Invading Computers & Selling Police Data
The Federal Police arrested a 33-year-old Brazilian hacker in Belo Horizonte, Minas Gerais. The suspect is accused of infiltrating the systems of the Federal Police (PF) and other international institutions to sell sensitive data. This arrest marks a critical step…
ConfusedPilot Exposes Vulnerability in AI Systems Used by Major Enterprises
A novel attack, dubbed ConfusedPilot, has been discovered, targeting widely used Retrieval Augmented Generation (RAG)-based AI systems such as Microsoft 365 Copilot. This method allows malicious actors to manipulate AI-generated responses by introducing malicious content into documents referenced by these…
Globe Life extortion, hacker USDoD arrested, Anonymous Sudan indicted
Insurance giant Globe Life facing extortion attempts after data theft from subsidiary Infamous hacker USDoD possibly arrested in Brazil Anonymous Sudan masterminds indicted Thanks to today’s episode sponsor, Conveyor It’s spooky season, and nothing’s scarier than all of your account…
Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption
Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks is making headlines due to a phishing scam targeting its customers with a promise of a free “Coffee Lovers Box.” However, this offer is entirely fraudulent. According to an update from Action…
Cisco ATA 190 Telephone Adapter Vulnerabilities Let Attackers Execute Remote Code
Cisco has disclosed multiple vulnerabilities affecting its ATA 190 Series Analog Telephone Adapter firmware, posing significant user risks. These vulnerabilities could allow remote attackers to execute unauthorized actions, including remote code execution, configuration changes, etc. Here’s a detailed breakdown of…
Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser
Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency, Consent, and Control (TCC) framework in macOS that has likely come under exploitation to get around a user’s privacy preferences and access data. The shortcoming, codenamed HM Surf…
Building Digital Resilience: Insider Insights for a Safer Cyber Landscape
Due to the tremendous feedback we received on our first two articles, which shared invaluable cybersecurity advice from industry experts, we’re excited to continue the series with even more insights. In this third installment, we delve deeper into the theme…
Intel robustly refutes China’s accusations it bakes in NSA backdoors
Chipzilla uses WeChat post to defend record of following local laws Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA).… This article has been indexed from The…
Despite massive security spending, 44% of CISOs fail to detect breaches
Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing security tools, according to Gigamon. Blind spots undermine…
Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began
‘My webcam isn’t working today’ is the new ‘The dog ate my network’ It’s a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it’s mistakenly hired a North Korean operative. The phony…
What to do if your iPhone or Android smartphone gets stolen?
A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their phones, a fact that criminals are well aware of. Cybersecurity risks resulting from…
Cybercrime’s constant rise is becoming everyone’s problem
Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new…
DDoS Attacks and the Upcoming US Presidential Election
A few weeks ago, Tesla CEO and X (formerly Twitter) owner Elon Musk hosted a friendly conversation on X with former President Donald Trump. The interview was delayed by more than 40 minutes as X experienced technical difficulties. Musk immediately…
New infosec products of the week: October 18, 2024
Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik, and Sectigo. GitGuardian Visual Studio Code extension helps developers protect their sensitive information GitGuardian’s new Visual Studio Code extension brings…
Addressing Critical Gaps in Threat Intelligence Sharing
Almost all organisations agree information sharing and collaboration are crucial elements in the fight against cybercriminals. That’s a majority as high as 91% according to respondents from recent research. With so many in favour of teaming up, it looks like…
As Attackers Embrace AI, Every Organization Should Do These 5 Things
AI benefits our society at large in numerous ways, but cybercriminals are using this new technology for nefarious purposes. From gathering data more efficiently to using large language models to craft phishing communications, experienced and novice threat actors are relying…
Singapore releases guidelines for securing AI systems and prohibiting deepfakes in elections
The security guidelines cover five stages of the AI lifecycle to help mitigate varying risks of AI implementation. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Singapore releases guidelines for securing AI…
ISC Stormcast For Friday, October 18th, 2024 https://isc.sans.edu/podcastdetail/9186, (Fri, Oct 18th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, October 18th, 2024…
Uncle Sam puts $10M bounty on Russian troll farm Rybar
Propaganda op focuses on anti-West narratives to meddle with elections The US has placed a $10 million bounty on Russian media network Rybar and a number of its key staffers following alleged attempts to sway the upcoming US presidential election.……
Two Sudanese nationals indicted for operating the Anonymous Sudan group
The DoJ charged Anonymous Sudan members and disrupted their DDoS infrastructure, halting its cyber operations. The US Justice Department charged two Sudanese brothers (Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27) with operating and controlling the cybercrime…
Troubled US insurance giant hit by extortion after data leak
Globe Life claims blackmailers shared stolen into with short sellers US insurance provider Globe Life, already grappling with legal troubles, now faces a fresh headache: an extortion attempt involving stolen customer data.… This article has been indexed from The Register…
The Evolution of Automated Browser Detection: A Cat & Mouse Game
Automated browser detection has changed dramatically throughout the years as bot developers seek easier ways to bypass detection, and bot protection vendors find new ways to identify and stop bots. The post The Evolution of Automated Browser Detection: A Cat…
Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship This article has been indexed from WeLiveSecurity Read the…
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs
EIW — ESET Israel Wiper — used in active attacks targeting Israeli orgs One of my Mastodon followers sent me an interesting toot today: This lead me to this forum post: "Government-Backed Attackers May Be Trying to Compromise Your Device!" email With this email: The forum post had…
Cato Networks CEO Shlomo Kramer to Speak at Bloomberg Tech London 2024
This week, SASE providers Cato Networks, announced that Shlomo Kramer, co-founder and CEO at Cato Networks, will be speaking at Bloomberg Tech London 2024. Kramer will appear at a session, “Protecting Your Information in the Cloud” (Tuesday, October 22 at 11:00…
Winners Named at Security Serious Unsung Heroes Awards 2024
Eskenzi PR today announced the winners of the ninth annual Security Serious Unsung Heroes Awards. The event took place last night at Balfour St Barts in London and celebrated the UK cybersecurity industry’s exceptional professionals, teachers, leaders, educators, and those…