A company has fallen victim to a cyberattack after unknowingly hiring a North Korean cybercriminal as a remote IT worker. The unidentified firm, based in the UK, US, or Australia, discovered the breach after the hacker downloaded sensitive data and…
AlpineReplay – 898,681 breached accounts
In 2019, the snow sports tracking app AlpineReplay suffered a data breach that exposed 900k unique email addresses. Later rolled into the Trace service, the breach included names, usernames, genders, dates of birth, weights and passwords stored as either unsalted…
GhostStrike: Open-source tool for ethical hacking
GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including process hollowing, to stealthily evade detection on Windows systems, making it an asset for penetration testing and security assessments. “I…
US contractor pays $300K to settle accusation it didn’t properly look after Medicare users’ data
Resolves allegations it improperly stored screenshots containing PII that were later snaffled A US government contractor will settle claims it violated cyber security rules prior to a breach that compromised Medicare beneficiaries’ personal data.… This article has been indexed from…
How NIS2 will impact sectors from healthcare to energy
In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the NIS2 Directive beyond traditional IT security. He explains how NIS2 will fundamentally change cybersecurity governance, making it a core aspect…
AI data collection under fire
A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching providers for any loss of trust.…
USENIX NSDI ’24 – Finding Adversarial Inputs for Heuristics using Multi-level Optimization
Authors/Presenters:Pooria Namyar, Microsoft and University of Southern California; Behnaz Arzani and Ryan Beckett, Microsoft; Santiago Segarra, Microsoft and Rice University; Himanshu Raj and Umesh Krishnaswamy, Microsoft; Ramesh Govindan, University of Southern California; Srikanth Kandula, Microsoft Our sincere thanks to USENIX,…
Why companies are struggling to keep up with SaaS data protection
While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents expressed high confidence…
Cyberangriff auf Internet Archive offenbar von russischen Hackern durchgeführt
Die freie Internet-Bibliothek mit ihrer “Wayback Machine” war tagelang nicht erreichbar. Es war der Cyberangriff einer russischen Hackergruppe, behauptet diese. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Cyberangriff auf Internet Archive offenbar von russischen Hackern…
Navigating the NIS2 Directive: A comprehensive guide for UK businesses
The tech regulatory landscape is constantly evolving, with the imminent Network and Information Security 2 Directive, more widely known as NIS2, that aims to enhance cybersecurity and resilience across the EU. EU Member States have until 17th October 2024 to…
A Turning Point in Loyalty Fraud Prevention
See how a recent FTC settlement highlights the need for effective loyalty fraud prevention strategies to mitigate risk, secure customer data, and minimize financial loss. The post A Turning Point in Loyalty Fraud Prevention appeared first on Security Boulevard. This…
ISC Stormcast For Thursday, October 17th, 2024 https://isc.sans.edu/podcastdetail/9184, (Thu, Oct 17th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, October 17th, 2024…
Nvidia just dropped a new AI model that crushes OpenAI’s GPT-4—no big launch, just big results
Nvidia quietly launched a groundbreaking AI model that surpasses OpenAI’s GPT-4 and Anthropic’s Claude 3.5, signaling a major shift in the competitive landscape of artificial intelligence. This article has been indexed from Security News | VentureBeat Read the original article:…
Scanning Activity from Subnet 15.184.0.0/16, (Thu, Oct 17th)
I noticed in my logs 2 weeks ago regular probe from a subnet in the Amazone cloud only scanning for TCP/8080 capture by the iptables of my DShield sensor. The scanning started on the 15 Aug – 4 Oct 2024…
Anthropic flags AI’s potential to ‘automate sophisticated destructive cyber attacks’
The maker of Claude LLMs revises its safety guidelines to manage escalating risks. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Anthropic flags AI’s potential to ‘automate sophisticated destructive cyber attacks’
Brazil arrests USDoD hacker tied to FBI, National Public Data breaches
Brazilian police have arrested the hacker known as USDoD, responsible for high-profile breaches including the FBI’s InfraGard and… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Brazil arrests USDoD…
Brazil’s Polícia Federal arrested the notorious hacker USDoD
Brazil’s Polícia Federal has arrested hacker USDoD, the hacker behind the National Public Data and InfraGard breaches. Brazil’s Polícia Federal (PF) announced the arrest in Belo Horizonte/MG of the notorious hacker USDoD. In August, a CrowdStrike investigation revealed that the…
US contractor pays $300k to settle accusation it didn’t properly look after Medicare users’ data
Resolves allegations it improperly stored screenshots containing PII that were later snaffled A US government contractor will settle claims it violated cyber security rules prior to a breach that compromised Medicare beneficiaries’ personal data.… This article has been indexed from…
Keeper Security Appoints New CISO
Keeper Security has announced the appointment of James Scobey as the company’s first Chief Information Security Officer (CISO). Scobey joins Keeper from the U.S. Securities and Exchange Commission (SEC), where he has served as CISO since 2022. Scobey’s experience encompasses…
Critical default credential bug in Kubernetes Image Builder allows SSH root access
It’s called leaving the door wide open – especially in Proxmox A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) due to default credentials being enabled during the image build process.… This article…
Volkswagen monitoring data dump threat from 8Base ransomware crew
The German car giant appears to be unconcerned The 8Base ransomware crew claims to have stolen a huge data dump of Volkswagen files and is threatening to publish them, but the German car giant appears to be unconcerned.… This article…
Preemption Playbook: Big Tech’s Blueprint Comes Straight from Big Tobacco
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Big Tech is borrowing a page from Big Tobacco’s playbook to wage war on your privacy, according to Jake Snow of the ACLU of Northern California. We…
Code Execution, Data Tampering Flaw in Nvidia NeMo Gen-AI Framework
Artificial intelligence tech giant Nvidia issues a warning for code execution and data tampering security problems in the NeMo platform. The post Code Execution, Data Tampering Flaw in Nvidia NeMo Gen-AI Framework appeared first on SecurityWeek. This article has been…
US Charges Duo Behind Anonymous Sudan for Over 35,000 DDoS Attacks
The US DoJ indicts two Sudanese nationals allegedly behind Anonymous Sudan for over 35,000 DDoS attacks targeting critical… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: US Charges Duo…