Cyberhaven, a prominent cybersecurity company, disclosed that its Chrome extension With 400,000+ users was targeted in a malicious cyberattack on Christmas Eve 2024, as part of a broader campaign affecting multiple Chrome extension developers. CEO Howard Ting announced the incident…
Category: EN
It’s only a matter of time before LLMs jump start supply-chain attacks
‘The greatest concern is with spear phishing and social engineering’ Interview Now that criminals have realized there’s no need to train their own LLMs for any nefarious purposes – it’s much cheaper and easier to steal credentials and then jailbreak…
16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web…
Anomaly Detection for Cybersecurity
A long promising approach comes of age I won’t revisit the arguments for anomaly detection as a crucial piece of cybersecurity. We’ve seen waves of anomaly detection over the years — and CISA, DARPA, Gartner, and others have explained the value of anomaly…
AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles
AT&T and Verizon Communications, two of America’s largest telecommunications providers, have confirmed they were targeted by the China-linked Salt Typhoon hacking operation, though both companies now report their networks are clear of the intrusion. In a statement released Saturday, Dallas-based…
China-linked APT Salt Typhoon breached a ninth U.S. telecommunications firm
A White House official confirmed that China-linked threat actor Salt Typhoon breached a ninth U.S. telecommunications company. A White House official confirmed confirmed that China-linked APT group Salt Typhoon has breached a ninth U.S. telecoms company as part of a…
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 26
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript Analyzing Malicious Intent in Python Code: A Case…
Security Affairs newsletter Round 504 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Pro-Russia group NoName…
A 9th Telecoms Firm Has Been Hit by a Massive Chinese Espionage Campaign, the White House Says
A top White House official said at least eight U.S. telecom firms and dozens of nations have been impacted by a Chinese hacking campaign. The post A 9th Telecoms Firm Has Been Hit by a Massive Chinese Espionage Campaign, the…
Bitcoin Heist in Japan Attributed to North Korean Cybercriminals
A joint alert from the FBI, the Department of Defense (D.O.D.) Cyber Crime Center and the National Police Agency of Japan reveal that a North Korean threat group carried out a significant cryptocurrency theft from Japan’s crypto firm DMM…
CISA’s Enhanced Mobile Security Recommendations Following U.S. Telecom Breach
The Cybersecurity and Infrastructure Security Agency (CISA) issued updated recommendations in December 2024 aimed at enhancing mobile phone cybersecurity. Following a significant hack involving major U.S. telecom companies like AT&T, Verizon, and Lumen Technologies, these guidelines focus on adopting…
Here’s How Google Willow Chip Will Impact Startup Innovation in 2025
As technology advances at an unprecedented rate, the recent unveiling of Willow, Google’s quantum computing device, ushers in a new age for startups. Willow’s unprecedented computing capabilities—105 qubits, roughly double those of its predecessor, Sycamore—allow it to accomplish jobs…
Restrictions on Free Expression and Access to Information in Times of Change: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> This was an historical year. A year in which elections took place in countries home to almost half the world’s population, a year of war, and collapse…
Aerial and Drone Surveillance: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> We’ve been fighting against aerial surveillance for decades because we recognize the immense threat from Big Brother in the sky. Even if you’re behind within the confines…
EFF’s 2023 Annual Report Highlights a Year of Victories: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Every fall, EFF releases its annual report, and 2023 was the year of Privacy First. Our annual report dives into our groundbreaking whitepaper along with victories in…
This month in security with Tony Anscombe – December 2024 edition
From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony Anscombe –…
Gain Relief with Strategic Secret Governance
Why is Efficient Secret Governance Essential? Have you ever pondered the importance of strategic secret governance and what it means to your cybersecurity strategy? In the evolving landscape of threats and vulnerabilities, it’s essential to consider new facets of security,…
Innovation in API Security: What’s New
So, What’s the Deal with Recent API Security Innovations? As companies across the spectrum of industries including finance, healthcare, travel, and more intensify their adoption of digital technologies, there’s an undeniable need for robust security measures to protect their assets…
Behind the Diner—Digital Rights Bytes: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Although it feels a bit weird to be writing a year in review post for a site that hasn’t even been live for three months, I thought it would be fun…
Cars (and Drivers): 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> If you’ve purchased a car made in the last decade or so, it’s likely jam-packed with enough technology to make your brand new phone jealous. Modern cars have sensors, cameras, GPS…