Category: EN

Speaking Freely: Prasanth Sugathan

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Interviewer: David Greene This interview has been edited for length and clarity.* Prasanth Sugathan is Legal Director at Software Freedom Law Center, India. (SFLC.in). Prasanth is a…

Do(ug)h! Krispy Kreme Suffers Cyberattack

Krispy Kreme, the doughnut giant, revealed on Wednesday that its online ordering systems in the US had been hit by a cyberattack. In a regulatory filing, Krispy Kreme disclosed that upon discovering an intruder in their systems on November 29th,…

Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation

  Mandiant researchers have discovered an innovative method to circumvent browser isolation technology by leveraging QR codes to establish command-and-control (C2) operations. This finding highlights potential vulnerabilities in existing web browser security measures. Understanding Browser Isolation Browser isolation is a…

The best VPN routers of 2024

Looking for a router that can provide full VPN coverage at home? These are the best routers that support VPN installation or include pre-installed VPNs. This article has been indexed from Latest stories for ZDNET in Security Read the original…

4.8 million healthcare records left freely accessible

Care1, a Canadian healthcare solutions provider left a cloud storage instance freely accessible and unencrypted for anyone to find. This article has been indexed from Malwarebytes Read the original article: 4.8 million healthcare records left freely accessible

Ultralytics Supply-Chain Attack

Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary: On December 4, a malicious version 8.3.41 of the popular AI library ultralytics ­—which has almost 60 million downloads—was published to the Python…

Beware of Malicious USB-C Cables: Hidden Cyber Threats

  In today’s tech-driven world, charging cables are indispensable. However, recent findings about compromised USB-C cables have highlighted significant risks associated with third-party accessories. Security experts warn that hackers can embed tiny computers within ordinary-looking cables, transforming them into tools…