Cut off one head, two more grow back in its place RansomHub, the ransomware collective that emerged earlier this year, quickly gained momentum, outpacing its criminal colleagues and hitting its victims especially hard. The group named and shamed hundreds of…
38C3: Kurzwellen-Funk der NATO mit Halfloop-Verschlüsselung ist unsicher
Der Halfloop-Verschlüsselungsalgorithmus, den das US-Militär und die NATO zum Schutz von Kurzwellen-Funkgeräten nutzen, enthält schwere Sicherheitsmängel. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: 38C3: Kurzwellen-Funk der NATO mit Halfloop-Verschlüsselung ist unsicher
IT Security News Hourly Summary 2024-12-28 12h : 1 posts
1 posts were published in the last hour 10:12 : Bundestagswahlen: Wahlsoftware immer noch unsicher
Bundestagswahlen: Wahlsoftware immer noch unsicher
Seit Jahren fordert der CCC eine transparente Wahlsoftware. Wie sinnvoll das wäre, zeigt die Analyse eines weit verbreiteten Tools. (38C3, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Bundestagswahlen: Wahlsoftware immer noch unsicher
Sicherheit für Mensch und Maschine
Der Maschinenbauer AuE Kassel hat bei Hexagon Purus Upside-Down-Maschinenschutztore von Efaflex für den Schutz der Mitarbeitenden installiert. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Sicherheit für Mensch und Maschine
KI für Einsteiger: Wie eine Excel-Tabelle die Grundlagen künstlicher Intelligenz erklärt
Wollt ihr verstehen, wie KI funktioniert? Das geht ganz einfach dank einer Excel-Tabelle. Diese zeigt euch die Grundzüge der künstlichen Intelligenz. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: KI für Einsteiger: Wie…
IT Security News Hourly Summary 2024-12-28 09h : 2 posts
2 posts were published in the last hour 7:32 : 2024 Attack Surface Threat Intelligence Report – Cogility – TacitRed 7:32 : North Korea actors use OtterCookie malware in Contagious Interview campaign
2024 Attack Surface Threat Intelligence Report – Cogility – TacitRed
Introduction Over 80% of cyber breaches result from external threat actors conducting phishing, session hijacking, account takeover, and ransomware attacks, putting organizations under mounting pressure to improve their security posture and automate cyber response. This increase in successful attacks stems…
North Korea actors use OtterCookie malware in Contagious Interview campaign
North Korea-linked threat actors are using the OtterCookie backdoor to target software developers with fake job offers. North Korea-linked threat actors were spotted using new malware called OtterCookie as part of the Contagious Interview campaign that targets software developer community…
15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug…
Erstmals Quanten-Teleportation über normales Glasfaserkabel gelungen
Erstmals ist eine Quanten-Teleportation über ein Glasfaserkabel gelungen, das zeitgleich für normalen Internetverkehr genutzt wurde – ein entscheidender Schritt in Richtung sichere Quantenkommunikation. Bisher galt das als unmöglich. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…
IT Security News Hourly Summary 2024-12-28 03h : 1 posts
1 posts were published in the last hour 1:9 : Cyber firm’s Chrome extension hijacked to steal user passwords
Cyber firm’s Chrome extension hijacked to steal user passwords
The data-loss startup says it was targeted as part of a “wider campaign to target Chrome extension developers.” © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the…
Week in Review: Microsoft deactivation flaw, BeyondTrust on KEV, LLM generated malware
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, CISO in Residence Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you…
IT Security News Hourly Summary 2024-12-28 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2024-12-27
IT Security News Daily Summary 2024-12-27
123 posts were published in the last hour 21:9 : Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again 20:9 : Wendepunkt: OpenAI will sich in For-Profit- und Non-Profit-Sparten aufteilen 20:5 : IT Security News…
Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again
Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them. The post Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again appeared first on Security Boulevard. This article has been…
Wendepunkt: OpenAI will sich in For-Profit- und Non-Profit-Sparten aufteilen
OpenAI hat angekündigt, einen Teil des Unternehmens in einen gewinnorientierten umzuwandeln. Was das für die Gemeinnützigkeit bedeutet – und warum zwei sehr bekannte Persönlichkeiten erbost sind. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen…
IT Security News Hourly Summary 2024-12-27 21h : 1 posts
1 posts were published in the last hour 19:34 : Detection Engineering: A Case Study
Detection Engineering: A Case Study
In this blog post, we will explore the intricate world of detection engineering. We’ll start by examining the inputs and outputs of detection engineering, and then we’ll illustrate the detection engineering lifecycle. The post Detection Engineering: A Case Study appeared…
Cyberhaven says it was hacked to publish a malicious update to its Chrome extension
The data-loss startup says it was targeted as part of a “wider campaign to target Chrome extension developers.” © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the…
North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often…
You Can Be a Part of this Grassroots Movement 🧑💻
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> You ever hear the saying, “it takes a village”? I never really understood the saying until I started going to conferences, attending protests, and working on EFF’s…
The Growing Intersection of Reproductive Rights and Digital Rights: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Dear reader of our blog, surely by now you know the format: as we approach the end of the year, we look back on our work, count…