OpenSSF has added four new members and is receiving $5 million in funding for its Alpha-Omega open source software security project. The post OpenSSF Receives $5 Million for Open Source Software Security Project appeared first on SecurityWeek. This article has…
Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers
Claroty has disclosed the details of 5 vulnerabilities that can be chained in an exploit allowing unauthenticated attackers to hack Netgear routers. The post Details Disclosed for Exploit Chain That Allows Hacking of Netgear Routers appeared first on SecurityWeek. This…
2023 AT&T Cybersecurity Insights Report: Edge Ecosystem
The 2023 AT&T Cybersecurity Insights Report examines how edge use cases are evolving, how organizations are changing to deliver better business outcomes through digital first experiences, and how an integrated ecosystem can work together to put security at the core…
North Korea-linked APT breached the Seoul National University Hospital
The Korean National Police Agency (KNPA) warns that a North Korea-linked APT group had breached the Seoul National University Hospital (SNUH). The Korean National Police Agency (KNPA) revealed that a North Korea-linked APT group has breached one of the largest…
NETGEAR launches Nighthawk M6 Pro 5G WiFi 6E Hotspot Router
NETGEAR launched its latest innovation: the Nighthawk M6 Pro 5G WiFi 6E Hotspot Router (MR6550). With its 5G mmWave and WiFi 6E capabilities, this device delivers ultra-fast internet speeds and enhanced connectivity, powerful enough for remote business sites and portable…
Arlo improves physical security for Ping Identity employees
Arlo Technologies announced a partnership with Ping Identity, the intelligent identity solution for the enterprise. The new benefit will provide Ping Identity’s approximately 800 US employees with an Arlo Safe subscription to deliver comprehensive on-the-go personal, family and car safety.…
Absolute to be acquired by Crosspoint Capital Partners
Absolute Software has agreed to be acquired by venture capital firm Crosspoint Capital Partners in a deal with an enterprise value of $870 million. Under the terms of the Arrangement Agreement, Absolute shareholders will receive $11.50 per Common Share in…
Comcast Business, Fortinet, and Exclusive Networks team up to offer fully managed IT services
Comcast Business, Fortinet, and Exclusive Networks teamed up to deliver a new distribution sales route and managed SD-WAN services for value-added resellers (VARs) and managed service providers (MSPs). The collaboration expands the Masergy Guardian Portfolio, adding additional sales routes and…
Passwords and 2FA Codes Stolen by the Android FluHorse Malware
The latest Android malware named ‘FluHorse’ has been discovered which targets Eastern Asian users with malicious apps that look like legitimate versions with over a million installs and are designed to steal personal data and spread malware. Check Point…
Dish Network Hit by Cyberattack and Multiple Lawsuits
Satellite TV provider, Dish Network, recently suffered a ransomware attack that compromised the sensitive data of its customers and employees. The attack occurred in February 2023 and was only revealed by the company in April. Since then, the company has…
What Apple Has in Store With Its New AR/VR Headset
Apple is reportedly working on an augmented reality (AR)/virtual reality (VR) headset that is expected to be released in 2023. The headset is said to … Read more The post What Apple Has in Store With Its New AR/VR Headset…
ENISA leans into EU-based clouds with draft cybersecurity label
Time for AWS and pals to start thinking about JVs? Cloud services providers that aren’t based in Europe — like the Big Three — may have to team up with a cloud that is operated and maintained from the EU if…
CACTUS ransomware evades antivirus and exploits VPN flaws to hack networks
By Deeba Ahmed CACTUS ransomware operators target large-scale commercial organizations with double extortion to steal sensitive data before encryption. This is a post from HackRead.com Read the original post: CACTUS ransomware evades antivirus and exploits VPN flaws to hack networks…
Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs
Two years ago, a popular ransomware-as-a-service group’s source code got leaked. Now other ransomware groups are using it for their own purposes. This article has been indexed from Dark Reading Read the original article: Multiple Ransomware Groups Adapt Babuk Code…
This data platform will help banks share criminal intelligence
Singapore is developing a digital platform to enable six major banks, including Citibank and Standard Chartered, to exchange data on customers involved in potentially illegal financial activities. This article has been indexed from Latest stories for ZDNET in Security Read…
Delaware Judge Refuses to Dismiss Facebook Shareholder Suit Over User Data Privacy Breaches
Judge refuses to dismiss shareholder lawsuit alleging that Facebook violated the law and fiduciary duties in failing for years to protect user data privacy. The post Delaware Judge Refuses to Dismiss Facebook Shareholder Suit Over User Data Privacy Breaches appeared…
Microsoft Makes Second Attempt to Patch Recent Outlook Zero-Day
Microsoft has rolled out patches for a vulnerability allowing attackers to bypass mitigations for a critical Outlook zero-day leading to credentials theft. The post Microsoft Makes Second Attempt to Patch Recent Outlook Zero-Day appeared first on SecurityWeek. This article has…
Google Improves Android Security With New APIs
Google is improving Android security with new Safe Browsing real-time API, credential manager jetpack API, and new SDK API for developers. The post Google Improves Android Security With New APIs appeared first on SecurityWeek. This article has been indexed from…
Senators Push Overhaul of Classification Rules After Trump, Biden Cases
Senators introduce bill to reform security classification system in the US to prevent mishandling of classified information and promote better use of intelligence. The post Senators Push Overhaul of Classification Rules After Trump, Biden Cases appeared first on SecurityWeek. This…
Google notifies users about dark web exposure
Google has announced new tools, features and updates to improve users’ online safety, help them evaluate content found online, and alert them if their Gmail identity appears on the dark web. New tools and options for users A new tool…
Dragos blocks ransomware attack, brushes aside extortion attempt
A ransomware group has tried and failed to extort money from Dragos, the industrial cybersecurity firm has confirmed on Wednesday, and reassured that none of its systems or its Dragos Platform had been breached. What happened? “The criminal group gained…
Snake Malware, Lockdown Mode, and Apple App Subscriptions
The FBI has shut down servers for Snake malware, which we wrote about back in 2017. Apple’s lockdown mode has been found to prevent some serious malware attacks. And Apple is testing the water with app subscriptions for two of…
A Republican-Led Lawsuit Threatens Critical US Cyber Protections
Three states are suing to block security rules for water facilities. If they win, it may open the floodgates for challenges to other cyber rules. This article has been indexed from Security Latest Read the original article: A Republican-Led Lawsuit…
How Attack Surface Management Supports Continuous Threat Exposure Management
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021 and gained popularity in 2022. In a different report, Gartner concluded that vulnerability management vendors are expanding their offerings to include Attack Surface Management (ASM) for a…
Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems
Multiple threat actors have capitalized on the leak of Babuk (aka Babak or Babyk) ransomware code in September 2021 to build as many as nine different ransomware families capable of targeting VMware ESXi systems. “These variants emerged through H2 2022…
Building Trustworthy AI
We will all soon get into the habit of using AI tools for help with everyday problems and tasks. We should get in the habit of questioning the motives, incentives, and capabilities behind them, too. Imagine you’re using an AI…
Google I/O: AI For Google Search
At its annual developer conference, Google revealed new hardware and software, with a focus on artificial intelligence (AI) This article has been indexed from Silicon UK Read the original article: Google I/O: AI For Google Search