Community Health Center (CHC), a Connecticut-based nonprofit healthcare provider, has confirmed that a hacker accessed the sensitive data of more than a million patients. In a filing with Maine’s attorney general on Thursday, CHC said it detected suspicious activity on…
Category: EN
Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer
Cybersecurity researchers have uncovered a sophisticated campaign leveraging GitHub’s trusted release infrastructure to distribute the Lumma Stealer malware. This information-stealing malware, part of a growing trend of cybercriminals abusing legitimate platforms, poses significant risks by exfiltrating sensitive data and deploying…
New York Blood Center Hit By Ransomware Attack – IT Systems Affected
The New York Blood Center Enterprises (NYBC), a vital organization responsible for supplying blood and blood products to hospitals across the region, has fallen victim to a ransomware attack. The incident has significantly disrupted its IT systems, forcing the organization…
US, Dutch Authorities Disrupt Pakistani Hacking Shop Network
US and Dutch authorities seized 39 domains to disrupt a network of hacking and fraud marketplaces operated by Saim Raza. The post US, Dutch Authorities Disrupt Pakistani Hacking Shop Network appeared first on SecurityWeek. This article has been indexed from…
Binarly helps organizations prepare for mandatory transition to PQC standards
Binarly announced Binarly Transparency Platform v2.7, a major update that enables corporate defenders to prepare for a mandatory transition to Post-Quantum Cryptography (PQC) standards. As quantum computing advances, the National Institute of Standards and Technology (NIST) has issued fresh guidance…
DoJ Sues To Halt HPE $14bn Acquisition Of Juniper Networks
US Justice Dept sues to block HPE proposed acquisition of Juniper, cites elimination of competition in wireless networking This article has been indexed from Silicon UK Read the original article: DoJ Sues To Halt HPE $14bn Acquisition Of Juniper Networks
CRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and Refit
Security researchers have uncovered critical CRLF (Carriage Return Line Feed) injection vulnerabilities in two widely used .NET libraries, RestSharp and Refit. These flaws, which allow attackers to manipulate HTTP headers and potentially execute HTTP request splitting, have been assigned CVE-2024-45302 for RestSharp and…
Italy’s data protection authority Garante blocked the DeepSeek AI platform
Italy’s data protection authority Garante blocked the DeepSeek AI service due to insufficient transparency regarding user data process. Italy’s data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek ‘s chatbot service within the country, citing a lack of information on…
DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks
The rapid rise of DeepSeek, a Chinese artificial intelligence (AI) company, has not only disrupted the AI industry but also attracted the attention of cybercriminals. As its AI Assistant app became the most downloaded free app on the iOS App…
GitHub Copilot Jailbreak Vulnerability Let Attackers Train Malicious Models
Researchers have uncovered two critical vulnerabilities in GitHub Copilot, Microsoft’s AI-powered coding assistant, that expose systemic weaknesses in enterprise AI tools. The flaws—dubbed “Affirmation Jailbreak” and “Proxy Hijack”—allow attackers to bypass ethical safeguards, manipulate model behavior, and even hijack access…
To Combat Cyberbullying and Online Fraud, We Must Do More to Protect Minors
The last 20 years have fundamentally redefined how consumers behave online. The emergence of sites such as YouTube, Meta, and X has reshaped how we share and consume media. Online… The post To Combat Cyberbullying and Online Fraud, We Must…
2 Arrested in Takedown of Nulled, Cracked Hacking Forums
Two individuals have been arrested and one alleged admin has been charged in the takedown of the Nulled and Cracked cybercrime forums. The post 2 Arrested in Takedown of Nulled, Cracked Hacking Forums appeared first on SecurityWeek. This article has…
Tata Technologies Hit by Ransomware Attack
The Indian tech giant temporarily suspended some of its IT services, which have now been restored This article has been indexed from www.infosecurity-magazine.com Read the original article: Tata Technologies Hit by Ransomware Attack
New York Blood Center Targeted by Ransomware, IT Operations Impacted
New York Blood Center Enterprises (NYBC), one of the nation’s largest blood donation and research organizations, has fallen victim to a ransomware attack, severely disrupting its IT systems. The incident, which was detected on Sunday, January 26, has triggered swift…
New York Blood Bank Hit by Ransomware
New York Blood Center Enterprises and its operating divisions have taken systems offline to contain a ransomware attack. The post New York Blood Bank Hit by Ransomware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
The push for 47-day certificates: a win for digital security and trust
By 2028, SSL/TLS certificate lifecycles may be cut down to just 47 days – a dramatic shift from the current 398-day maximum. Apple’s recent ballot submission to the CA/Browser Forum proposes this change, and it’s gaining traction among industry leaders,…
JumpCloud Acquires Stack Identity to Extend Access Management Reach
JumpCloud this week revealed it has acquired Stack Identity to fuel an effort to add identity security and access visibility capabilities to its directory. The post JumpCloud Acquires Stack Identity to Extend Access Management Reach appeared first on Security Boulevard.…
Patient monitors with backdoor are sending info to China, CISA warns
Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and execute…
How to find out if an AirTag is tracking you – and what to do about it
Apple’s trackers have been misused to track some without their consent. Here’s how to check if an AirTag is tracking you, whether you use an iPhone or Android phone. Plus, what to do next if you find one. This article…
CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors
CISA and FDA say Contec patient monitors used in the US contain a backdoor function that could allow remote attackers to tamper with the device. The post CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors appeared first on…