Byte Federal says the personal information of 58,000 was compromised after a GitLab flaw allowed attackers to access a server. The post Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal appeared first on SecurityWeek. This article has…
Category: securityweek
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested
The US announced the takedown of Rydox, a marketplace for stolen personal information, and the arrest of three administrators. The post Rydox Cybercrime Marketplace Disrupted, Administrators Arrested appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices
Germany’s cybersecurity agency BSI has sinkholed a botnet of 30,000 devices shipped with BadBox malware pre-installed. The post Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel. The post Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel appeared first on…
Fake IT Workers Funneled Millions to North Korea, DOJ Says
The Justice Department announced indictments against 14 North Koreans for involvement in a scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft. The post Fake IT Workers Funneled Millions to…
Phishing: The Silent Precursor to Data Breaches
Phishing is more than a mere nuisance—it is a formidable precursor to destructive data breaches. The post Phishing: The Silent Precursor to Data Breaches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Phishing:…
Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform
Threat intel startup Silent Push has raised $10 million in a funding round co-led by Ten Eleven Ventures and Stepstone Group LP. The post Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform appeared first on SecurityWeek. This article…
Sublime Snags $60M Series B for Email Security Tech
Sublime said the new capital was provided by IVP, Citi Ventures, Index Ventures, Decibel Partners, and Slow Ventures and brings the total raised to $93.8 million. The post Sublime Snags $60M Series B for Email Security Tech appeared first on…
The Ghost of Christmas Past – AI’s Past, Present and Future
The potential for how AI may change the way we work is endless, but we are still a way off from this and careful planning and consideration is what is needed. The post The Ghost of Christmas Past – AI’s…
Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement
Lookout details EagleMsgSpy, a surveillance tool used by Chinese law enforcement to collect data from Android devices. The post Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Microsoft MFA Bypassed via AuthQuake Attack
Oasis Security has disclosed AuthQuake, a method for bypassing Microsoft MFA within an hour without user interaction. The post Microsoft MFA Bypassed via AuthQuake Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
27 DDoS Attack Services Taken Down by Law Enforcement
Law enforcement agencies in 15 countries cooperated in taking down 27 websites selling DDoS-for-hire services. The post 27 DDoS Attack Services Taken Down by Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Cleo Patches Exploited Flaw as Security Firms Detail Malware Pushed in Attacks
Cleo has released patches for the exploited vulnerability and security firms have detailed the malware delivered in attacks. The post Cleo Patches Exploited Flaw as Security Firms Detail Malware Pushed in Attacks appeared first on SecurityWeek. This article has been…
Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites
Two vulnerabilities in the Hunk Companion and WP Query Console WordPress plugins allow attackers to backdoor websites. The post Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites appeared first on SecurityWeek. This article has been indexed from…
Apple Pushes Major iOS, macOS Security Updates
Cupertino ships iOS 18.2 and macOS Sequoia 15.2 patches to fix data leakage, sandbox escapes and code exection vulnerabilities. The post Apple Pushes Major iOS, macOS Security Updates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Industry Moves for the week of December 9, 2024 – SecurityWeek
Explore industry moves and significant changes in the industry for the week of December 9, 2024. Stay updated with the latest industry trends and shifts. This article has been indexed from SecurityWeek Read the original article: Industry Moves for the…
No Doughnuts Today? Cyberattack Puts Krispy Kreme in a Sticky Situation
The doughnut and coffeehouse chain confirmed a cyberattack took out parts of its online ordering system in parts of the United States. The post No Doughnuts Today? Cyberattack Puts Krispy Kreme in a Sticky Situation appeared first on SecurityWeek. This…
BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections
Academic researchers devise BadRAM, a new attack that uses $10 equipment to break AMD’s latest trusted execution environment protections. The post BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections appeared first on SecurityWeek. This article has been indexed…
Google Pays $55,000 for High-Severity Chrome Browser Bug
Google pushes out major Chrome browser updates to fix multiple serious security defects. The post Google Pays $55,000 for High-Severity Chrome Browser Bug appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Google Pays…
Now on Demand: Inside a Hacker’s Playbook – How Cybercriminals Use Deepfakes
This eye-opening session that pulls back the curtain on how bad actors exploit social engineering tactics, like deepfake technology and Business Email Compromise (BEC). The post Now on Demand: Inside a Hacker’s Playbook – How Cybercriminals Use Deepfakes appeared first…