Der IT-Sicherheitsexperte Dennis-Kenji Kipker zerreißt das Sicherheitspaket der Regierung. Die Pläne seien “unüberlegt und unausgereift”. (Gesichtserkennung, Vorratsdatenspeicherung) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Biometrische Gesichtserkennung: Jurist warnt vor “sicherheitsbehördlichem Daten-Supergau”
Upgrade nicht empfohlen: MacOS 15 Sequoia liefert allerhand Netzwerkprobleme
Nicht nur Security-Tools von Crowdstrike, Sentinelone und Microsoft machen unter MacOS 15 Probleme. Auch die integrierte Firewall blockiert mehr als erwartet. (MacOS, Apple) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Upgrade nicht empfohlen: MacOS…
heise-Angebot: iX-Workshop: Sich selbst hacken – Pentesting mit Open-Source-Werkzeugen
Lernen Sie, wie Sie Sicherheitslücken in der eigenen Unternehmens-IT mit Hacker-Tools aufdecken und beseitigen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: heise-Angebot: iX-Workshop: Sich selbst hacken – Pentesting mit Open-Source-Werkzeugen
Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)
How do analyst relations professionals ‘sort through the noise’ and help deliver the not-so-secret sauce for a company’s success? We spoke with ESET’s expert to find out. This article has been indexed from WeLiveSecurity Read the original article: Influencing the…
FTC Sounds the Alarm on Social Media Spying on Children and Teenagers
Social media and video streaming services (SMVSSs), including Amazon, Alphabet-owned YouTube, Meta’s Facebook and TikTok, are engaging in a “vast surveillance of users” to profit off their personal information. The report also raised concerns about the lack of meaningful privacy…
7 Steps to Perform a Cyber Attack Simulation
We can learn a lot from soccer and American football teams when it comes to attack and defense strategies. Players analyze the opposing team’s strategy to identify weak spots, adapt their offensive orchestration accordingly, and, most importantly, practice, practice, practice.…
Krypto-Start-up: Neben Iris-Scan jetzt auch Gesichts-Scan bei Worldcoin
Sam Altmans Kryptoprojekt bietet jetzt neben dem Orb eine zusätzliche Authentifikationsmethode an. Außerdem will man sich den Datenschutzbedenken stellen. (Gesichtserkennung, KI) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Krypto-Start-up: Neben Iris-Scan jetzt auch Gesichts-Scan…
Biometrische Gesichtserkennung: Jurist befürchtet “sicherheitsbehördlichen Daten-Supergau”
Der IT-Sicherheitsexperte Dennis-Kenji Kipker lässt kein gutes Haar am Sicherheitspaket der Regierung. Die Pläne seien “unüberlegt und unausgereift”. (Gesichtserkennung, Vorratsdatenspeicherung) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Biometrische Gesichtserkennung: Jurist befürchtet “sicherheitsbehördlichen Daten-Supergau”
U.S. Justice Department Disrupts China-Backed Botnet Targeting Thousands of Devices
In a major cyber operation, the U.S. Justice Department announced the successful takedown of a botnet controlled by People’s Republic of China (PRC) state-sponsored hackers. The botnet, dubbed “Raptor Train” by Black Lotus Labs, spanned over 200,000 devices globally. It…
Exploding pagers and the new face of asset-centric warfare
Attacks on critical infrastructure The explosion of the Soviet gas pipeline in 1982 was one of the first well-known instances of critical infrastructure being targeted through a software modification that contained a hidden malfunction. In this instance, the Soviets were…
Striking the balance between cybersecurity and operational efficiency
In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresses the importance of aligning with various frameworks.…
How to detect and stop bot activity
Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and degrade site performance. New technologies are enabling fraudsters to strike faster…
Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks
Ivanti has revealed that a critical security flaw impacting Cloud Service Appliance (CSA) has come under active exploitation in the wild. The new vulnerability, assigned the CVE identifier CVE-2024-8963, carries a CVSS score of 9.4 out of a maximum of…
New infosec products of the week: September 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from anecdotes, F5 Networks, Gcore, Rapid7, Strivacity, and Veritas Technologies. Veritas unveils AI-driven features to simplify cyber recovery Veritas Technologies unveiled new AI-driven capabilities to further…
Rising identity security risks: Why organizations must act now
As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are struggling with frequent breaches and inadequate security measures, particularly concerning machine identities. Despite increased efforts and awareness, issues…
Supply chain targets 3,000 users. Cyber Security Today for Friday, September 20, 2024
Cybersecurity Today: Supply Chain Attacks, Data Breaches, and Botnet Threat Disruptions In this episode of ‘Cybersecurity Today,’ host Jim Love covers pressing issues in the cybersecurity world, including a supply chain attack in Lebanon, a major data breach at AT&T…
Nextcloud Hub 9 released: New features, more security, updated performance
Nextcloud has launched Nextcloud Hub 9, a significant update to its open-source cloud-based collaboration platform. It introduces several new features to improve user experience, performance, and security. Enhanced security in Nextcloud Hub 9 Nextcloud Hub 9 lets you strengthen your…
ISC Stormcast For Friday, September 20th, 2024 https://isc.sans.edu/podcastdetail/9146, (Fri, Sep 20th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, September 20th, 2024…
CISA boss: Makers of insecure software are the real cyber villains
Write better code, urges Jen Easterly. And while you’re at it, give crime gangs horrible names like ‘Evil Ferret’ Software developers who ship buggy, insecure code are the real villains in the cyber crime story, Jen Easterly, boss of the…
Valencia Ransomware explodes on the scene, claims California city, fashion giant, more as victims
Boasts ‘appear to be credible’ experts tell El Reg A California city, a Spanish fashion giant, an Indian paper manufacturer, and two pharmaceutical companies are the alleged victims of what looks like a new ransomware gang that started leaking stolen…
The Hidden AI Risk Lurking In Your Business
The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware. The post The Hidden AI Risk Lurking In Your Business appeared first on Palo Alto Networks Blog. This article has…
Security review for Microsoft Edge version 129
We are pleased to announce the security review for Microsoft Edge, version 129! We have reviewed the new settings in Microsoft Edge version 129 and determined that there are no additional security settings that require enforcement. The Microsoft Edge…
Valencia Ransomware crew explodes on the scene, claims California city, fashion giant, more as victims
Boasts ‘appear to be credible’ experts tell El Reg A California city, a Spanish fashion giant, an Indian paper manufacturer, and two pharmaceutical companies are the alleged victims of what looks like a new ransomware gang that started leaking stolen…
Chipmaker Qualcomm lays off hundreds of workers in San Diego
This is the chipmaker’s second round of layoffs over the past year, while the company recorded billions in revenue. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read…