The journey of building a business is an exhilarating experience, whether it’s a startup taking its first steps, a small-to-medium business (SMB) scaling new heights, or an enterprise striving for sustained growth. However, regardless of the size or stage,…
Category: EN
Apple might be working on a smart doorbell
There’s been a lot of reporting in recent months around Apple’s efforts to expand its footprint in customers’ homes with in-development products like a wall-mounted smart home hub. According to a new report in Bloomberg, that strategy could also include…
Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. BadBox rapidly grows,…
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion Spyware distributed through Amazon Appstore BADBOX Botnet Is Back Supply Chain Attack on…
Beware of Fake Delivery Text Scams During Holiday Shopping
< p style=”text-align: justify;”> As the holiday shopping season peaks, cybercriminals are taking advantage of the increased online activity through fake delivery text scams. Disguised as urgent notifications from couriers like USPS and FedEx, these scams aim to steal…
Thousands of SonicWall Devices Vulnerable to Critical Security Threats
< p style=”text-align: justify;”> Thousands of SonicWall network security devices are currently exposed to severe vulnerabilities, with over 20,000 running outdated firmware that no longer receives vendor support. This puts countless organizations at risk of unauthorized access and potential…
Phishing Scams Target YouTubers: Malware Hidden in Fake Brand Deals
Cybercriminals are using a complex phishing scam to target the owners of YouTube channels and their teams, thus exposing the accounts and personal information to severe threats. According to cybersecurity experts, a report was released on how the attackers…
AMD Systems Vulnerability Could Threaten Encrypted Data Protection
There has been an announcement of a new technique for bypassing key security protections used in AMD chips to gain access to the clients of those services. Researchers believe that hackers will be able to spy on clients through…
The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a serious issue: we don’t have legal clarity on what exactly… The post The Urgent Need for Data Minimization Standards appeared…
US charged Dual Russian and Israeli National as LockBit Ransomware developer
US authorities charged a dual Russian and Israeli national for being a developer of the LockBit ransomware group. Rostislav Panev, 51, a dual Russian-Israeli national, was charged as a LockBit ransomware developer. Arrested in Israel, he awaits extradition to the…
Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MUT-1244 targeting security researchers, red teamers, and threat actors A threat actor tracked as MUT-1244 by DataDog researchers has been targeting academics, pentesters, red teamers,…
RIIG Announces Two New Board Members to Guide Strategy and Accelerate Growth
New Board Members Include Top Leaders in Tech, Scientific Communities Charlottesville, VA (12/18/2024) — RIIG, an AI driven risk intelligence and cybersecurity solutions provider, announces the addition of two new members, Cody Sanford and Philip E. Bourne to its advisory…
The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025
Almost every single organisation, large or small, is acutely aware of the need to implement robust security measures. However, this is easier said than done. As the threat landscape continues to evolve, only heightened by tools such as AI, it…
BadBox rapidly grows, 190,000 Android devices infected
Experts uncovered a botnet of 190,000 Android devices infected by BadBox bot, primarily Yandex smart TVs and Hisense smartphones. Bitsight researchers uncovered new BADBOX infrastructure, company’s telemetry shows that over 192,000 devices were infected with the BADBOX bot. The botnet includes…
DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners
Authors/Presenters: Adnan Khan, John Stawinski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…
EFF Tells Appeals Court To Keep Copyright’s Fair Use Rules Broad And Flexible
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s critical that copyright be balanced with limitations that support users’ rights, and perhaps no limitation is more important than fair use. Critics, humorists, artists, and activists…
Novel Android NoviSpy Spyware Linked to Qualcomm Zero-Day Flaws
Amnesty International researchers discovered an Android zero-day bug that was exploited to silently disseminate custom surveillance spyware targeting Serbian journalists. The probe has traced the technology to Cellebrite, an Israeli forensics vendor. In a technical report published earlier this…
Hackers Infect Security Researchers with Malware to Steal WordPress Credentials
For the past year, a cyberattack campaign has been targeting security professionals, including red teamers, penetration testers, and researchers, infecting their systems with malware. The malicious software has been used to steal WordPress credentials and sensitive data while also…
Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine even the most meticulously crafted code. But what if you… The post Four Ways to Harden Your Code Against Security…
PCI DSS 4.0: A Comprehensive Guide to Enhanced Payment Data Security
In the ever-evolving landscape of cybersecurity, regulation often plays a lagging, but critical role in driving industry wide improvements in security posture, particularly around the security of Payments Data (Note 1). The Payment Card Industry Data Security Standard (PCI DSS)…