Forty-one cybersecurity-related M&A deals were announced in March 2023. The post Cybersecurity M&A Roundup: 41 Deals Announced in March 2023 appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: Cybersecurity M&A Roundup:…
Tag: SecurityWeek RSS Feed
Success of Genesis Market Takedown Attempt Called Into Question
Law enforcement announced the takedown of Genesis Market, but the impact on the cybercrime marketplace’s infrastructure may be limited. The post Success of Genesis Market Takedown Attempt Called Into Question appeared first on SecurityWeek. This article has been indexed from…
Push Security Raises $15 Million in Series A Funding
Push Security has raised $15 million in a Series A funding round led by Google Ventures. The post Push Security Raises $15 Million in Series A Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Tax Return Filing Service eFile.com Caught Serving Malware
Online tax return filing service eFile.com was injected with malicious JavaScript code serving malware to visitors. The post Tax Return Filing Service eFile.com Caught Serving Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Nexx Ignores Vulnerabilities Allowing Hackers to Remotely Open Garage Doors
Nexx has ignored repeated attempts to report critical product vulnerabilities that can be exploited to remotely open garage doors, and take control of alarms and smart plugs. The post Nexx Ignores Vulnerabilities Allowing Hackers to Remotely Open Garage Doors appeared…
Cybercrime Website Genesis Market Seized by FBI
The FBI has seized Genesis Market, a major cybercrime website offering stolen device fingerprints. The post Cybercrime Website Genesis Market Seized by FBI appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Android’s April 2023 Updates Patch Critical Remote Code Execution Vulnerabilities
Android’s April 2023 security updates were released this week with patches for two critical-severity vulnerabilities leading to remote code execution. The post Android’s April 2023 Updates Patch Critical Remote Code Execution Vulnerabilities appeared first on SecurityWeek. This article has been…
Chrome 112 Patches 16 Security Flaws
Chrome 112 was released to the stable channel this week with 16 security fixes, including 14 for vulnerabilities reported by external researchers. The post Chrome 112 Patches 16 Security Flaws appeared first on SecurityWeek. This article has been indexed from…
KPMG Tackles AI Security With Cranium Spinout
Consulting giant KPMG spins out a startup building technology to secure AI (artificial intelligence) applications and deployments. The post KPMG Tackles AI Security With Cranium Spinout appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Strivacity Scores $20M for CIAM Expansion Plans
Strivacity, a Virginia startup working on technology to simplify and secure customer logins, has attracted $20 million in funding to fuel global expansion plans. The post Strivacity Scores $20M for CIAM Expansion Plans appeared first on SecurityWeek. This article has…
TikTok’s Trials and Tribulations Continue With UK Data Protection Fine
The UK’s data protection regulator fined TikTok £12.7 million for “failing to use children’s personal data lawfully” The post TikTok’s Trials and Tribulations Continue With UK Data Protection Fine appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Trustle Raises $6M Seed Funding for Access Management Tech
California startup Trustle banks a $6 million seed round to join the competitive cloud access management technology space. The post Trustle Raises $6M Seed Funding for Access Management Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA ‘Must Patch’ List
CISA has added to its Known Exploited Vulnerabilities catalog a Zimbra vulnerability exploited in attacks targeting NATO countries The post Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA ‘Must Patch’ List appeared first on SecurityWeek. This article…
Self-Propagating, Fast-Encrypting ‘Rorschach’ Ransomware Emerges
The sophisticated, self-propagating Rorschach ransomware is one of the fastest at encrypting victim’s files. The post Self-Propagating, Fast-Encrypting ‘Rorschach’ Ransomware Emerges appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: Self-Propagating, Fast-Encrypting…
CardinalOps Extends MITRE ATT&CK-based Detection Posture Management
Tel Aviv- and Boston-based CardinalOps has extended its detection posture management capability with MITRE ATT&CK Security Layers. The post CardinalOps Extends MITRE ATT&CK-based Detection Posture Management appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
3CX Supply Chain Attack: North Korean Hackers Likely Targeted Cryptocurrency Firms
3CX supply chain attack appears to have been conducted by North Korean hackers with the goal of targeting cryptocurrency firms. The post 3CX Supply Chain Attack: North Korean Hackers Likely Targeted Cryptocurrency Firms appeared first on SecurityWeek. This article has…
Cybereason Raises $100 Million, Appoints New CEO
Cybereason appoints new CEO as it receives $100 million in venture funding from SoftBank Corp. The post Cybereason Raises $100 Million, Appoints New CEO appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
NATO Seeks Contractors to Test Security of Web Assets
NATO is looking for penetration testing vendors to assess the security of its internet-facing web assets. The post NATO Seeks Contractors to Test Security of Web Assets appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Cisco to Acquire Cloud Security Firm Lightspin for Reported $200 Million
Cisco is set to acquire Israel-based cloud security company Lightspin for a reported $200-250 million. The post Cisco to Acquire Cloud Security Firm Lightspin for Reported $200 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Elementor Pro Plugin Vulnerability Exploited to Hack WordPress Websites
A severe vulnerability in the Elementor Pro WordPress plugin is being exploited to inject malware into vulnerable websites. The post Elementor Pro Plugin Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications
Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it. The post ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications appeared first on SecurityWeek. This…
Western Digital Shuts Down Services Due to Cybersecurity Breach
Western Digital shuts down several of its services after discovering a network security breach. The post Western Digital Shuts Down Services Due to Cybersecurity Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
US Defense Department Launches ‘Hack the Pentagon’ Website
New ‘Hack the Pentagon’ website helps DoD organizations launch bug bounty programs and recruit security researchers. The post US Defense Department Launches ‘Hack the Pentagon’ Website appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Microsoft OneNote Starts Blocking Dangerous File Extensions
Microsoft is boosting the security of OneNote users by blocking embedded files with extensions that are considered dangerous. The post Microsoft OneNote Starts Blocking Dangerous File Extensions appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Europe, North America Most Impacted by 3CX Supply Chain Hack
Europe, the United States and Australia seem to be the most impacted by the 3CX supply chain hack, according to data from two cybersecurity firms. The post Europe, North America Most Impacted by 3CX Supply Chain Hack appeared first on…
4.8 Million Impacted by Data Breach at TMX Finance
Consumer loan provider TMX Finance is informing over 4.8 million individuals that their personal information was stolen in a data breach. The post 4.8 Million Impacted by Data Breach at TMX Finance appeared first on SecurityWeek. This article has been…
TikTok Attorney: China Can’t Get U.S. Data Under Plan
TikTok general counsel says company is trying to make it physically impossible for any government, including China, to access to U.S. user data. The post TikTok Attorney: China Can’t Get U.S. Data Under Plan appeared first on SecurityWeek. This article…
Italy Temporarily Blocks ChatGPT Over Privacy Concerns
Italy is temporarily blocking the artificial intelligence software ChatGPT in the wake of a data breach as it investigates a possible violation of stringent European Union data protection rules. The post Italy Temporarily Blocks ChatGPT Over Privacy Concerns appeared first on SecurityWeek.…
FDA Announces New Cybersecurity Requirements for Medical Devices
The FDA is asking medical device manufacturers to provide cybersecurity-related information when submitting an application for a new product. The post FDA Announces New Cybersecurity Requirements for Medical Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Report: Chinese State-Sponsored Hacking Group Highly Active
Chinese hacking group linked previously to attacks on U.S. state government computers is still “highly active” The post Report: Chinese State-Sponsored Hacking Group Highly Active appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
Lumen Technologies Hit by Two Cyberattacks
Communications and IT company Lumen Technologies fell victim to two cyberattacks that led to data theft. The post Lumen Technologies Hit by Two Cyberattacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Votiro Raises $11.5 Million to Prevent File-Borne Threats
Votiro raised $11.5 million in a Series A investment round led by Harvest Lane Asset Management. The post Votiro Raises $11.5 Million to Prevent File-Borne Threats appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
Several cybersecurity companies have published blog posts, advisories and tools to help organizations that may have been hit by the 3CX supply chain attack. The post Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months appeared first…
Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
Documents show that Russian IT company NTC Vulkan was requested to develop offensive tools for government-backed hacking group Sandworm. The post Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks appeared first on SecurityWeek. This article has been indexed…
Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
A high-severity vulnerability in Azure Service Fabric Explorer could have allowed a remote, unauthenticated attacker to execute arbitrary code. The post Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution appeared first on SecurityWeek. This article has been indexed from…
Anti-Bot Software Firm DataDome Banks $42M Financing
DataDome, a New York startup selling anti-bot and anti-fraud tech, has secured $42 million in new financing to fuel expansion plans. The post Anti-Bot Software Firm DataDome Banks $42M Financing appeared first on SecurityWeek. This article has been indexed from…
Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
Water pumping systems made by ProPump and Controls are affected by several vulnerabilities that could allow hackers to cause significant problems. The post Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks appeared first on SecurityWeek. This article…
Why Endpoint Resilience Matters
When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own security. The post Why Endpoint Resilience Matters appeared first on SecurityWeek. This article has been indexed…
Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
The recently identified Melofee Linux implant allowed Chinese cyberespionage group Winnti to conduct stealthy, targeted attacks. The post Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
500k Impacted by Data Breach at Debt Buyer NCB
NCB Management Services is informing roughly 500,000 individuals of a data breach impacting their personal information. The post 500k Impacted by Data Breach at Debt Buyer NCB appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
3CX confirms investigating a security breach as the cybersecurity community is sharing more information on what appears to be a sophisticated supply chain attack. The post 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component appeared first on SecurityWeek.…
Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
An Azure Active Directory (AAD) misconfiguration leading to Bing.com compromise earned Wiz researchers a $40,000 bug bounty reward. The post Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data appeared first on SecurityWeek. This article has…
UK Introduces Mass Surveillance With Online Safety Bill
The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into end-to-end content The post UK Introduces Mass Surveillance With Online Safety Bill appeared first on SecurityWeek.…
Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
A group computer scientists and tech experts are calling for a 6-month pause to consider the profound risks of AI to society and humanity. The post Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT appeared first on…
Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
CrowdStrike threat intelligence team warns about unexpected malicious activity from a legitimate, signed version of the 3CXDesktopApp. The post Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
New York startup LeapXpert secures funding for technology to help businesses manage the use of consumer messaging apps in the enterprise. The post LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps appeared first on SecurityWeek. This article…
OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
OpenAI resolved severe ChatGPT vulnerabilities that could have been exploited to take over accounts. The post OpenAI Patches Account Takeover Vulnerabilities in ChatGPT appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Spera Banks $10 Million to Tackle Identity and Access Sprawl
Backed by YL Ventures, Spera banks $10 million to help businesses deal with identity and access sprawl in the enterprise. The post Spera Banks $10 Million to Tackle Identity and Access Sprawl appeared first on SecurityWeek. This article has been…
Blockchain Security Firm True I/O Raises $9 Million
Total Network Services rebrands to True I/O and raises $9 million to accelerate deployment of product. The post Blockchain Security Firm True I/O Raises $9 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
OpenSSL 1.1.1 will reach EoL in six months and users are instructed to either upgrade to a newer version or pay for extended support to continue receiving security patches. The post OpenSSL 1.1.1 Nears End of Life: Security Updates Only…
Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
Australian casino giant Crown Resorts says the Cl0p ransomware group contacted them to claim data theft in the GoAnywhere attack. The post Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims appeared first on SecurityWeek. This article has been…
New Wi-Fi Attack Allows Traffic Interception, Security Bypass
A group of academic researchers devised an attack that can intercept Wi-Fi traffic at the MAC layer, bypassing client isolation. The post New Wi-Fi Attack Allows Traffic Interception, Security Bypass appeared first on SecurityWeek. This article has been indexed from…
What Makes an Effective Anti-Bot Solution?
While there are likely many different approaches, here are a few points that are important for enterprises to consider when evaluating bot solutions. The post What Makes an Effective Anti-Bot Solution? appeared first on SecurityWeek. This article has been indexed…
QuSecure and Accenture Test Multi-Orbit Communications Link Using Post-Quantum Cryptography
Quantum cybersecurity firm QuSecure has collaborated with Accenture to develop a multi-orbit quantum-resilient satellite communications capability. The post QuSecure and Accenture Test Multi-Orbit Communications Link Using Post-Quantum Cryptography appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Over 200 Organizations Targeted in Chinese Cyberespionage Campaign
Chinese cyberespionage group Mustang Panda was seen targeting maritime, shipping, border control, and immigration organizations in recent attacks. The post Over 200 Organizations Targeted in Chinese Cyberespionage Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
A new research report discusses the five most exploited vulnerabilities of 2022, and the five key risks that security teams should consider. The post Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report appeared first on SecurityWeek. This article…
Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
Google has linked several zero-day vulnerabilities used last year to target Android and iOS devices to commercial spyware vendors. The post Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors appeared first on SecurityWeek. This article has been indexed…
Mandiant Catches Another North Korean Gov Hacker Group
Mandiant flags APT43 as a “moderately-sophisticated cyber operator that supports the interests of the North Korean regime.” The post Mandiant Catches Another North Korean Gov Hacker Group appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Video: How to Build Resilience Against Emerging Cyber Threats
Enjoy this session as we walk through three recent use cases where a new threat caught organizations off-guard. The post Video: How to Build Resilience Against Emerging Cyber Threats appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Microsoft Puts ChatGPT to Work on Automating Cybersecurity
Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks. The post Microsoft Puts ChatGPT to Work on Automating Cybersecurity appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an actively exploited vulnerability. The post ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component…
SecurityScorecard Guarantees Accuracy of Its Security Ratings
SecurityScorecard is offering free digital forensics and incident response (DFIR) services to customers that have scored an ‘A’ rating if they have been breached. The post SecurityScorecard Guarantees Accuracy of Its Security Ratings appeared first on SecurityWeek. This article has…
China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
A South Asian espionage group named Bitter has been observed targeting the Chinese nuclear energy sector. The post China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Nigerian BEC Scammer Sentenced to Prison in US
Solomon Ekunke Okpe was sentenced to four years in prison in the US for his role in a BEC fraud ring. The post Nigerian BEC Scammer Sentenced to Prison in US appeared first on SecurityWeek. This article has been indexed…
Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Webinar on third-party identity access risks will discuss topics such as unauthorized access, data breaches, and the manipulation or theft of sensitive information The post Webinar Today: Understanding Hidden Third-Party Identity Access Risks appeared first on SecurityWeek. This article has…
14 Million Records Stolen in Data Breach at Latitude Financial Services
Australian financial services provider Latitude says roughly 14 million user records were stolen in a recent cyberattack. The post 14 Million Records Stolen in Data Breach at Latitude Financial Services appeared first on SecurityWeek. This article has been indexed from…
iOS Security Update Patches Exploited Vulnerability in Older iPhones
Apple has released security updates for older iPhones to address a vulnerability exploited in attacks. The post iOS Security Update Patches Exploited Vulnerability in Older iPhones appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
The UK’s National Crime Agency has been running several DDoS-for-hire websites to collect information about individuals looking to launch such attacks. The post Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police appeared first on SecurityWeek. This article has…
Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
Microsoft says it has evidence that Russian APT actors were exploiting a nasty Outlook zero-day as far back as April 2022, upping the stakes on organizations to start hunting for signs of compromise. The post Microsoft: No-Interaction Outlook Zero Day…
Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
Security researchers raked in more than $1 million in prizes at this year’s CanSecWest Pwn2Own software exploitation contest. The post Hackers Earn Over $1 Million at Pwn2Own Exploit Contest appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
US to Adopt New Restrictions on Using Commercial Spyware
Executive order will require the head of any U.S. agency using commercial spyware programs to certify that the program doesn’t pose a significant counterintelligence or other security risk. The post US to Adopt New Restrictions on Using Commercial Spyware appeared…
Australia Dismantles BEC Group That Laundered $1.7 Million
Law enforcement in Australia announce the arrest of four individuals accused of running business email compromise (BEC) schemes. The post Australia Dismantles BEC Group That Laundered $1.7 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
GoAnywhere Zero-Day Attack Hits Major Orgs
Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra’s GoAnywhere software. The post GoAnywhere Zero-Day Attack Hits Major Orgs appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks
Webinar on third-party identity access risks will discuss topics such as unauthorized access, data breaches, and the manipulation or theft of sensitive information The post Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks appeared first on SecurityWeek. This article has…
‘Grim’ Criminal Abuse of ChatGPT is Coming, Europol Warns
Criminals are set to take advantage of artificial intelligence like ChatGPT to commit fraud and other cybercrimes, Europe’s policing agency warned. The post ‘Grim’ Criminal Abuse of ChatGPT is Coming, Europol Warns appeared first on SecurityWeek. This article has…
GitHub Rotates Publicly Exposed RSA SSH Private Key
GitHub replaced the RSA SSH private key used to secure Git operations for GitHub.com after it was exposed in a public GitHub repository. The post GitHub Rotates Publicly Exposed RSA SSH Private Key appeared first on SecurityWeek. This article has…
GitHub Suspends Repository Containing Leaked Twitter Source Code
Twitter sent a copyright notice to code hosting service GitHub to request the removal of a repository that contained Twitter source code. The post GitHub Suspends Repository Containing Leaked Twitter Source Code appeared first on SecurityWeek. This article has been…
Google Leads $16 Million Investment in Dope.security
Dope.security raised $16 million in Series A funding for its fly-direct Secure Web Gateway (SWG). The post Google Leads $16 Million Investment in Dope.security appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Intel Co-founder, Philanthropist Gordon Moore Dies at 94
Intel Corp. co-founder Gordon Moore, who the breakneck pace of progress in the digital age with a simple 1965 prediction of how quickly engineers would boost the capacity of computer chips, has died. He was 94. The post Intel Co-founder,…
US Charges 20-Year-Old Head of Hacker Site BreachForums
The US Justice Department charged Conor Brian Fitzpatrick, founder of BreachForums, a major underground website for computer hackers. The post US Charges 20-Year-Old Head of Hacker Site BreachForums appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Tesla Hacked Twice at Pwn2Own Exploit Contest
Researchers at French offensive hacking shop Synacktiv demonstrated successful exploit chains against Tesla’s newest electric car to take top billing at the annual Pwn2Own contest. The post Tesla Hacked Twice at Pwn2Own Exploit Contest appeared first on SecurityWeek. This article…
CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
The U.S. government’s cybersecurity agency ships a new tool to help network defenders hunt for signs of compromise in Microsoft’s Azure and M365 cloud deployments. The post CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections appeared…
Critical WooCommerce Payments Vulnerability Leads to Site Takeover
A critical-severity flaw in the WooCommerce Payments WordPress plugin could allow attackers to take over site administrator accounts. The post Critical WooCommerce Payments Vulnerability Leads to Site Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
CISA Gets Proactive With New Pre-Ransomware Alerts
CISA has sent notifications to more than 60 organizations as part of a new initiative to alert entities of early-stage ransomware attacks. The post CISA Gets Proactive With New Pre-Ransomware Alerts appeared first on SecurityWeek. This article has been indexed…
PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
Proof-of-concept code to exploit a just-patched security hole in the Veeam Backup & Replication product has been published online. The post PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw appeared first on SecurityWeek. This article has been indexed…
TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
A nearly six-hour grilling of TikTok’s CEO by lawmakers brought the platform’s 150 million U.S. users no closer to an answer as to whether the app will be wiped from their devices. The post TikTok CEO Grilled by Skeptical Lawmakers…
Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
Join us for the virtual experience as we bring together security experts to discuss the complex nature of the supply chain problem, best practices for mitigating security issues. The post Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions appeared…
CISA, NSA Issue Guidance for IAM Administrators
New CISA and NSA guidance includes recommended best practices for identity and access management (IAM) administrators. The post CISA, NSA Issue Guidance for IAM Administrators appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
On March 15, 2023, the SEC announced a proposal for new cybersecurity requirements for covered entities. The post Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
Intel shares information on the security improvements brought by its new vPro platform powered by 13th Gen Core processors. The post Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform appeared first on SecurityWeek. This article has…
Cisco Patches High-Severity Vulnerabilities in IOS Software
Cisco’s semiannual security updates for IOS and IOS XE software resolve high-severity DoS, command injection, and privilege escalation vulnerabilities. The post Cisco Patches High-Severity Vulnerabilities in IOS Software appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Tackling the Challenge of Actionable Intelligence Through Context
Making threat intelligence actionable requires more than automation; it also requires contextualization and prioritization. The post Tackling the Challenge of Actionable Intelligence Through Context appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
‘Nexus’ Android Trojan Targets 450 Financial Applications
Promoted as a MaaS, the Nexus Android trojan targets 450 financial applications for account takeover. The post ‘Nexus’ Android Trojan Targets 450 Financial Applications appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Dole Says Employee Information Compromised in Ransomware Attack
Dole has admitted in an SEC filing that its investigation into the recent ransomware attack found that the hackers had accessed employee information. The post Dole Says Employee Information Compromised in Ransomware Attack appeared first on SecurityWeek. This article has…
‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
Black Lantern Security introduces Badsecrets, an open source tool for identifying known or weak cryptographic secrets across multiple platforms. The post ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks appeared first on SecurityWeek. This article has been indexed…
Backslash Snags $8M Seed Financing for AppSec Tech
Backslash Security banks seed-stage capital to build new technology to identify and mitigate “toxic code flows” in cloud-native applications. The post Backslash Snags $8M Seed Financing for AppSec Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Chrome 111 Update Patches High-Severity Vulnerabilities
The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers. The post Chrome 111 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
Cisco Talos researchers found two high-severity vulnerabilities in WellinTech’s KingHistorian industrial data historian software. The post High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Malware Trends: What’s Old is Still New
Many of the most successful cybercriminals are shrewd; they want good ROI, but they don’t want to have to reinvent the wheel to get it. The post Malware Trends: What’s Old is Still New appeared first on SecurityWeek. This article…
CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
CISA announces adding more experts to its Cybersecurity Advisory Committee and updating the Cybersecurity Performance Goals. The post CISA Expands Cybersecurity Committee, Updates Baseline Security Goals appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…