Category: Security News | TechCrunch

Internet access in Gaza partially restored after blackout

After a weekend of almost complete internet blackout, connectivity in Gaza has been partially restored. On Friday, internet monitoring firms and experts reported that access to the internet had significantly degraded in the Palestinian enclave. The local internet service NetStream…

Internet access in Gaza is collapsing as ISPs fall offline

As the conflict between Israel and Hamas reaches its third week, internet connectivity in Gaza is getting worse. On Thursday, internet monitoring firm NetBlocks wrote on X, formerly Twitter, that the Palestinian internet service provider NetStream “has collapsed days after…

Google adds generative AI threats to its bug bounty program

Google has expanded its vulnerability rewards program (VRP) to include attack scenarios specific to generative AI. In an announcement shared with TechCrunch ahead of publication, Google said: “We believe expanding the VRP will incentivize research around AI safety and security…

Okta’s latest hack fallout hits Cloudflare, 1Password

Network and security giant Cloudflare and password manager maker 1Password said hackers briefly targeted their systems following a recent breach of Okta’s support unit. Both Cloudflare and 1Password said their recent intrusions were linked to the Okta breach, but that…

International Criminal Court says cyberattack was attempted espionage

The International Criminal Court (ICC), the world’s only permanent international court with a mandate to investigate and prosecute genocide, crimes against humanity and war crimes, has determined that a September cyberattack against its systems was attempted espionage. The court, headquartered…

Telegram is still leaking user IP addresses to contacts

The popular messaging app Telegram can leak your IP address if you simply add a hacker to your contacts and accept a phone call from them. Denis Simonov, a security researcher, who is also known as n0a, recently highlighted the…

Russia and China-backed hackers are exploiting WinRAR zero-day bug

Google security researchers say they have found evidence that government-backed hackers linked to Russia and China are exploiting a since-patched vulnerability in WinRAR, the popular shareware archiving tool for Windows. The WinRAR vulnerability, first discovered by cybersecurity company Group-IB earlier…

Zygon helps startups avoid data breaches from SaaS providers

Last week, cloud computing company Shadow confirmed a data breach involving customers’ personal information. The hacker claims to have access to the data of more than 530,000 customers. According to an email from Shadow CEO Eric Sèle, the hacker managed…

Shadow silent on data breach as hacked data appears genuine

A data breach at French cloud gaming provider Shadow may be worse than the company initially suggested, according to a sample of the stolen data seen by TechCrunch. In an email sent to affected customers this week, Paris-based Shadow said…

Cloud gaming firm Shadow says hackers stole customers’ personal data

French technology company Shadow has confirmed a data breach involving customers’ personal information. The Paris-headquartered startup, which offers gaming through its cloud-based PC service, said in an email to customers this week that hackers had accessed their personal information after…

SEC is investigating MOVEit mass-hack, says Progress Software

U.S. securities regulators have opened a probe into the MOVEit mass-hack that has exposed the personal data of at least 64 million people, according to the company that made the affected software. In a regulatory filing this week, Progress Software…

Lyca Mobile says customer data was stolen during cyberattack

U.K.-based Lyca Mobile has confirmed intruders accessed customers’ personal information after breaking into its systems. Lyca Mobile, the London-headquartered mobile virtual network operator (MVNO) that piggybacks off network operator EE’s infrastructure, said earlier this week that it had been the…

Hacked phone spyware shuts down . . . again

A short-lived spyware operation called Oospy, which emerged earlier this year after its predecessor Spyhide was hacked, is no longer operational and has shut down. Oospy appeared online in late July as a rebrand of a phone monitoring app called…

Hacked phone spyware shuts down… again

A short-lived spyware operation called Oospy, which emerged earlier this year after its predecessor Spyhide was hacked, is no longer operational and has shut down. Oospy appeared online in late July as a rebrand of a phone monitoring app called…

Zero-days for hacking WhatsApp are now worth millions of dollars

Thanks to improvements in security mechanisms and mitigations, hacking cell phones — both running iOS and Android — has become an expensive endeavor. That’s why hacking techniques for apps like WhatsApp are now worth millions of dollars, TechCrunch has learned.…

Advancing generative AI exploration safely and securely

Guardrails for testing and learning are essential to accelerating exploration while minimizing security risks. This article has been indexed from Security News | TechCrunch Read the original article: Advancing generative AI exploration safely and securely

Qakbot hackers are still spamming victims despite FBI takedown

The hackers behind Qakbot, a notorious malware operation that was recently “dismantled” by the FBI, are still active and continue to target new victims, researchers say. The FBI announced in August that it had successfully “disrupted and dismantled” the infrastructure…

Lyca Mobile blames cyberattack for network disruption

U.K.-based mobile virtual network provider giant Lyca Mobile has confirmed a cyberattack that caused service disruption for millions of its customers. Lyca Mobile claims to be the world’s largest international mobile virtual network operator, or MVNO, which piggybacks off network…

Gem Security raises $23M for its cloud security platform

Cloud detection and response company Gem Security today announced that it has raised a $23 million Series A round led by GGV Capital, with participation from IBM Ventures, Cisco and Silicon Valley CISO Investments. It was only in February that…

Why the public sector is an easy target for ransomware

We’re on track for 2023 to be a record breaking year for ransomware attacks targeting the U.S. public sector. These attacks, which includes both traditional encrypt-and-extort and newer data theft-only attacks, know the public sector is an easy target: It’s…

Hackers steal $200M from crypto company Mixin

Hong Kong-based crypto company Mixin announced on Sunday that it was breached and that the hackers stole around $200 million. “In the early morning of September 23, 2023 Hong Kong time, the database of Mixin Network’s cloud service provider was…

Hackers steal $200 million from crypto company Mixin

Hong Kong-based crypto company Mixin announced on Sunday that it was breached and that the hackers stole around $200 million. “In the early morning of September 23, 2023 Hong Kong time, the database of Mixin Network’s cloud service provider was…

Decade of newborn child registry data stolen in MOVEit mass-hack

Ontario’s government-funded birth registry has confirmed a data breach affecting some 3.4 million people who sought pregnancy care, including the personal health data of close to two million newborns and children across the Canadian province. BORN Ontario said in a…

Google’s Parisa Tabriz on how the company stays ahead of hackers

Google is constantly under attack. But while hackers have compromised gaming giants, casinos and other technology giants in recent months, Google has so far remained largely unscathed. Parisa Tabriz, who is responsible for Chrome web browser security and Project Zero,…

Kindo aims to take the security stress out of AI workflows

Ron Williams, co-founder and CEO of Kindo, knows a thing or two about cybersecurity, having previously led security teams at League of Legends developer Riot Games, shared scooter startup Bird and Alphabet-backed Clover Health. He is now bringing this expertise…

GitHub launches passkey support into general availability

GitHub is formally launching its passkeys security feature into general availability, two months after first debuting it in beta. Passkeys offer cloud-synced authentication using cryptographic key pairs, allowing users to sign-in to websites and apps with the same screen-lock PIN…

Cisco to acquire Splunk in $28B mega deal

Cisco has a reputation of building the company through acquisitions, but it has tended to stay away from the really huge ones. That changed this morning when the company announced it was acquiring Splunk for $28 billion. With Splunk, it…

Donald Trump Jr. X account was hacked, spokesperson confirms

Donald Trump Jr.’s account on X (formerly Twitter) was hacked on Wednesday morning. The account published a post that falsely claimed that his father, former president Donald Trump, had passed away. “I’m sad to announce, my father Donald Trump has…

Legit Security lands $40M to lock down apps and dev environments

Legit Security, a cybersecurity company developing a platform to identify app vulnerabilities from code, has raised $40 million in a Series B funding round led by CRV with participation from Cyberstarts, Bessemer Venture Partners and TCV. Co-founder and CEO Roni…

International Criminal Court says hackers accessed its systems

The International Criminal Court (ICC) has said it experienced a cyberattack last week after hackers accessed its internal systems. The ICC, headquartered in The Hague, Netherlands, is the only permanent war crimes tribunal. Established in 2002, the court is currently…

HiddenLayer raises $50M for its AI-defending cybersecurity tools

HiddenLayer, a security startup focused on protecting AI systems from adversarial attacks, today announced that it raised $50 million in a funding round co-led by M12 and Moore Strategic Ventures with participation from Booz Allen Hamilton, IBM, Capital One and…

Cato Networks, valued at $3B, lands $238M ahead of its anticipated IPO

Cato Networks, the Tel Aviv-based startup that packages software-defined networking, managed cybersecurity and global backbone services into a single offering, today announced that it raised $238 million in an equity investment that values the company at over $3 billion. LightSpeed…

One of the FBI’s most wanted hackers is trolling the U.S. government

Earlier this year, the U.S. government indicted Russian hacker Mikhail Matveev, also known by his online monikers “Wazawaka” and “Boriselcin,” accusing him of being “a prolific ransomware affiliate” who carried out “significant attacks” against companies and critical infrastructure in the…

UK police officers’ data stolen in cyberattack on ID supplier

The personal details of thousands of U.K. police officers have been stolen after a suspected ransomware attack on a third-party supplier. Greater Manchester Police, one of the largest police departments in the U.K., confirmed last week that the supplier, since…

iOS 17 includes these new security and privacy features

Apple’s long-awaited iOS 17 update for iPhones lands today with a number of new and improved security features. Much of the new features are aimed at protecting iPhone owners who are at greater risk of cyberattacks and spyware, like journalists,…

X launches account verification based on government ID

X, formerly Twitter, has launched government ID-based account verification for paid users to prevent impersonation and give them benefits such as “prioritized support.” The social network has partnered with Israel-based Au10tix for identity verification solutions. The pop-up for ID verification…

Caesars Entertainment says customer data stolen in cyberattack

Hotel and casino giant Caesars Entertainment said Thursday that hackers stole a huge trove of customer data in a recent cyberattack, confirming recent media reports. Caesars said in an 8-K notice with federal regulators filed before markets opened on Thursday…

Zenity strives to keep no-code/low-code apps secure

So many companies are using low-code and no-code tools these days to create apps and workflows. These tools are by design likely in the hands of non-technical end users, but the problem is that these folks might not know about…

Zenity strives to keep no code/low code apps secure

So many companies are using low code and no code tools these days to create apps and workflows. These tools are by design likely in the hands of non-technical end users, but the problem is that these folks might not…

AuthMind raises seed funding for its identity SecOps platform

AuthMind, a Maryland-based startup that aims to help businesses protect themselves from identity-related cyberattacks, today announced that it has raised an $8.5 million seed round led by Ballistic Ventures, with strategic participation from IBM Ventures. The company was co-founded by…

MGM Resorts blames ‘cybersecurity issue’ for ongoing outage

Hotel and casino giant MGM Resorts has confirmed a “cybersecurity issue” is to blame for an ongoing outage affecting systems at the company’s Las Vegas properties. “MGM Resorts recently identified a cybersecurity issue affecting some of the company’s systems,” the…