Italy’s data regulator fines OpenAI 15m euros over lack of ‘adequate legal basis’ for data collection, concerns over exposure of young people This article has been indexed from Silicon UK Read the original article: Italy Fines OpenAI 15m Euros Over…
OpenAI Gives Details On For-Profit Shift
OpenAI to create public benefit corporation in Delaware in effort to put it on even footing with competitors, attract investors This article has been indexed from Silicon UK Read the original article: OpenAI Gives Details On For-Profit Shift
AT&T and Verizon say networks are secure after being breached by China-linked Salt Typhoon hackers
U.S. telecom giants AT&T and Verizon say they have secured their networks after being targeted by the China-linked Salt Typhoon cyberespionage group. In a statement given to TechCrunch on Monday, AT&T spokesperson Alexander Byers said the company detects “no activity by…
Salt Typhoon’s Reach Continues to Grow
The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon. This article has been indexed from Schneier on Security Read the original article: Salt Typhoon’s Reach Continues to Grow
US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries
The DoJ has issued a final rule addressing adversaries’ access to and exploitation of Americans’ bulk sensitive personal information. The post US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries appeared first on SecurityWeek. This article has been…
38C3: Tag 3 bringt gehackte Gefängnisse, Standortdaten und Steuerbetrug
Am dritten Kongresstag in Hamburg übten die Vortragenden deutliche Systemkritik: an mangelnden CumEx-Konsequenzen, unfairen Monopolen und Steueroasen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: 38C3: Tag 3 bringt gehackte Gefängnisse, Standortdaten und Steuerbetrug
The Most Dangerous People on the Internet in 2024
From Elon Musk and Donald Trump to state-sponsored hackers and crypto scammers, this was the year the online agents of chaos gained ground. This article has been indexed from Security Latest Read the original article: The Most Dangerous People on…
Several Chrome Extensions Compromised in Supply Chain Attack
Cyberhaven and other Chrome extensions were compromised in a supply chain attack targeting Facebook advertising users. The post Several Chrome Extensions Compromised in Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions
News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have…
Changes in SSL and TLS support in 2024, (Mon, Dec 30th)
With the end of the year quickly approaching, it is undoubtedly a good time to take a look at what has changed during the past 12 months. One security-related area, which deserves special attention in this context, is related to…
“Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know About
As artificial intelligence gets smarter, cybercriminals are discovering all new ways to hack and scam their victims. Can you believe your eyes? According to the… The post “Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know…
What’s Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In
We are fast approaching the end of (another) turbulent year for cybersecurity. Looking back, it’s hard to believe that so much can happen in such a short time. As we finish up our work for the year, head home to…
The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley
A Divisive Veto: California Rejects AI Safety Bill SB 1047 California Governor Gavin Newsom’s recent veto of SB 1047, a proposed AI safety bill, has sparked a hot debate on the balance between innovation and regulation in the artificial intelligence…
Cisco Confirms Authenticity of Data After Second Leak
Cisco has confirmed that 4 Gb of data leaked by a hacker is authentic and related to a recently disclosed security incident. The post Cisco Confirms Authenticity of Data After Second Leak appeared first on SecurityWeek. This article has been…
IT Security News Hourly Summary 2024-12-30 12h : 2 posts
2 posts were published in the last hour 10:32 : Verizon says it has secured its network after breach by China-linked Salt Typhoon group 10:5 : PoC Exploited Released for Oracle Weblogic Server Vulnerability
Verizon says it has secured its network after breach by China-linked Salt Typhoon group
U.S. telecom giant Verizon says it has secured its network after being targeted by the China-linked Salt Typhoon cyberespionage group. In a statement given to TechCrunch on Sunday, Verizon spokesperson Richard Young said the company has “contained the cyber incident brought…
PoC Exploited Released for Oracle Weblogic Server Vulnerability
Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic Server. The flaw tracked as CVE-2024-21182, poses a significant risk to organizations using the server, as it allows an unauthenticated attacker with…
2024 Year in Review: What We Got Right and Looking to 2025
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt…
38C3: BitLocker-Verschlüsselung von Windows 11 umgangen, ohne PC zu öffnen.
Zwei Jahre nach der vermeintlichen Behebung einer Lücke kann diese weiterhin genutzt werden, um BitLocker-geschützte Festplatten von Windows 11 zu entschlüsseln Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: 38C3: BitLocker-Verschlüsselung von Windows 11 umgangen, ohne…
Threat actors attempt to exploit a flaw in Four-Faith routers
VulnCheck researchers warn that threat actors are attempting to exploit a high-severity vulnerability impacting some Four-Faith routers. Cybersecurity firm VulnCheck warns that a high-severity flaw, tracked as CVE-2024-12856 (CVSS score: 7.2), in Four-Faith routers is actively exploited in the wild. The vulnerability…
[UPDATE] [hoch] Linux-Kernel: Schwachstelle ermöglicht Denial of Service und Privilegienerweiterung
Ein lokaler Angreifer kann eine Schwachstelle im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder seine Privilegien zu erweitern. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [hoch] Linux-Kernel:…
[UPDATE] [niedrig] OpenSC: Schwachstelle ermöglicht Denial of Service
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSC ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [niedrig] OpenSC: Schwachstelle ermöglicht…
[UPDATE] [mittel] OpenSC: Schwachstelle ermöglicht Denial of Service
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSC ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] OpenSC: Schwachstelle ermöglicht…
[UPDATE] [niedrig] OpenSC: Mehrere Schwachstellen ermöglichen Denial of Service
Ein physischer Angreifer kann mehrere Schwachstellen in OpenSC ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [niedrig] OpenSC: Mehrere Schwachstellen ermöglichen…