Tag: Security News | TechCrunch

FTC bans another data broker from selling consumers’ location data

The U.S. Federal Trade Commission has continued its crackdown on data brokers with a settlement banning data aggregation company InMarket from selling consumers’ precise location data. Texas-based InMarket, which debuted as CheckPoints at TechCrunch Disrupt 2010, provides a marketing platform that…

Google says Russian espionage crew behind new malware campaign

Google researchers say they have evidence that a notorious Russian-linked hacking group — tracked as “Cold River” — is evolving its tactics beyond phishing to target victims with data-stealing malware. Cold River, also known as “Callisto Group” and “Star Blizzard,”…

As hacks worsen, SEC turns up the heat on CISOs

Over the past year we’ve seen Uber’s former chief security officer convicted in federal court for mishandling a data breach, a federal regulator charge SolarWinds’ security chief with allegedly misleading investors prior to its own cyberattack, and new regulations that…

Hackers begin mass exploiting Ivanti VPN zero-day flaws

Malicious hackers have begun mass-exploiting two critical zero-day vulnerabilities in Ivanti’s widely-used corporate VPN appliance. That’s according to cybersecurity company Volexity, which first reported last week that China state-backed hackers are exploiting the two unpatched flaws in Ivanti Connect Secure…

Snyk acquires Helios to bolster its AppSec platform

Snyk, the well-funded developer-focused security company, today announced that it has acquired Helios, a Tel Aviv-based startup that helps developers troubleshoot and understand their microservices in production. Snyk will use Helios to bolster its recently launched AppRisk service, its application…

GenAI could make KYC effectively useless

KYC, or “know your customer,” is a process intended to help financial institutions, fintech startups and banks verify the identity of their customers. Not uncommonly, KYC authentication involves “ID images,” or cross-checked selfies used to confirm a person is who…

Gen AI could make KYC effectively useless

KYC, or “Know Your Customer,” is a process intended to help financial institutions, fintech startups and banks verify the identity of their customers. Not uncommonly, KYC authentication involves “ID images,” or cross-checked selfies used to confirm a person is who…

LoanDepot hit by suspected ransomware attack

Mortgage and loan giant LoanDepot said Monday it is experiencing a cyberattack and that it’s “working diligently to restore normal business operations as quickly as possible.” The Irvine, Calif.-based company said in a brief statement on its cybersecurity incident page…

Law firm that handles data breaches was hit by data breach

An international law firm that works with companies affected by security incidents has experienced its own cyberattack that exposed the sensitive health information of hundreds of thousands of data breach victims. San Francisco-based Orrick, Herrington & Sutcliffe said last week…

Crypto losses declined over 50% in 2023

The total amount “lost” during 2023 from security incidents was almost $2 billion. © 2023 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: Crypto losses declined…

Here we go again: 2023’s badly handled data breaches

Last year, we compiled a list of 2022’s most poorly handled data breaches looking back at the bad behavior of corporate giants when faced with hacks and breaches. That included everything from downplaying the real-world impact of spills of personal…

Meet the cybercriminals of 2023

Once again we look back at the past year in cybercrime and those who we lost… to the law. This year was no different to last: we saw another round of high-profile busts, arrests, sanctions, and prison time for some…

Meet the cyber-criminals of 2023

Once again we look back at the past year in cybercrime and those who we lost… to the law. This year was no different to last: we saw another round of high-profile busts, arrests, sanctions, and prison time for some…

India pressed Apple on state-sponsored warnings, report says

Apple’s warnings in late October that Indian journalists and opposition figures may have been targeted by state-sponsored attacks prompted a forceful counterattack from Prime Minister Narendra Modi’s government. Officials publicly doubted Apple’s findings and announced a probe into device security.…

Why extortion is the new ransomware threat

Cybercriminals are becoming more aggressive in their effort to maximize disruption and compel the payment of ransom demands, and now there’s a new extortion tactic in play. In early November, the notorious ALPHV ransomware gang, also known as BlackCat, attempted…

WhatsApp adds support for disappearing voice messages

While today’s bigger news from the world of Meta’s messaging apps was the rollout of end-to-end encryption in Messenger, the company is also bringing another useful feature to its WhatsApp users: disappearing voice messages. The new feature will allow users…

Your mobile password manager might be exposing your credentials

A number of popular mobile password managers are inadvertently spilling user credentials due to a vulnerability in the autofill functionality of Android apps. The vulnerability, dubbed “AutoSpill,” can expose users’ saved credentials from mobile password managers by circumventing Android’s secure…

Hacker claims theft of Shadowfax users’ information

A hacker claims to be selling millions of user records relating to Indian startup Shadowfax, which offers logistics services to e-commerce and hyperlocal platforms across the country. The pseudonymous hacker said in a listing on a known cybercrime forum that…

LockBit claims cyberattack on India’s national aerospace lab

The notorious ransomware gang LockBit has claimed responsibility for a cyberattack targeting India’s state-owned aerospace research lab. On Wednesday, LockBit added the National Aerospace Laboratories (NAL) to its dark web leak site, which ransomware gangs use to extort victims for…