Nvidia CSO David Reber argues that generative AI solutions like ChatGPT have turned cybersecurity into a ‘cat and mouse’ game. This article has been indexed from Security News | VentureBeat Read the original article: Nvidia CSO: Generative AI, ChatGPT has…
Firms fear software stack breach as attack surface widens
Almost 80% believe their organization is vulnerable to multi-tiered cyber attacks that can impact the entire application stack in the next 12 months, with 48% noting that an expanded attack surface has posed more challenges. This article has been indexed…
Key Insights From the Guide to Cybersecurity Trends and Predictions for 2022-23
The cybersecurity landscape has become something of a battle royale: companies and cyber criminals are continually trying to outsmart one another in an effort to be the last one standing. Thankfully, many businesses are seeking a proactive approach, aiming to…
The State of the US National Cybersecurity Strategy for the Electric Grid
The distribution systems of the U.S. energy grid — the portions of the grid that carry electricity to consumers — are growing more susceptible to cyber-attacks, in part due to the advent of monitoring and control technology and their reliance…
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared their head once again with new updates that allow it to block contactless payment transactions. Russian cybersecurity firm Kaspersky said it detected three versions of Prilex (06.03.8080,…
Auditing Kubernetes with Open Source SIEM and XDR
Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard, organizations widely use Kubernetes for deploying, scaling, and managing containerized applications. Organizations should audit Kubernetes to ensure compliance with regulations, find anomalies, and…
Nevada Ransomware Has Released Upgraded Locker
Researchers from Resecurity have identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. Resecurity, California-based cybersecurity company protecting Fortune 500 globally, has identified a new version of Nevada Ransomware…
New LockBit Green ransomware variant borrows code from Conti ransomware
Lockbit ransomware operators have released a new version of their malware, LockBit Green, that also targets cloud-based services. Lockbit ransomware operators have implemented a new version of their malware, dubbed LockBit Green, which was designed to include cloud-based services among…
Threat Actors Gained Access to Google Fi Customers’ Information
Google Fi, the cell network provider of Google, recently confirmed a data breach. It is likely that the incident is related to the recent T-Mobile security incident, which allowed threat actors to steal the information of millions of customers. Based…
Congress Has a Lo-Fi Plan to Fix the Classified Documents Mess
As unsecured docs pile up, a bipartisan group of lawmakers is itching to overhaul the nation’s secret secret-sharing operation. This article has been indexed from Security Latest Read the original article: Congress Has a Lo-Fi Plan to Fix the Classified…
The Pivot: How MSPs can Turn a Challenge Into a Once-in-a-Decade Opportunity
Cybersecurity is quickly becoming one of the most significant growth drivers for Managed Service Providers (MSPs). That’s the main insight from a recent study from Lumu: in North America, more than 80% of MSPs cite cybersecurity as a primary growth driver of…
Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data. “The campaign abuses legitimate but compromised email accounts to…
LockBit Goes ‘Green’: How the New Conti-Based Encryptor Is Changing the Ransomware Game
The LockBit ransomware gang has resumed using encryptors based on other operations, switching to one based on the Conti ransomware‘s leaked source code. Since its inception, the LockBit operation has gone through several iterations of its encryptor, beginning with a…
What Is Data Erasure?
One of the major topics of cybersecurity is sheltering your data against data breaches. And while many Internet users have in place measures to protect their information from hackers’ hands while using them, once they delete the data, they might…
Hackers Abuse Google Ads to Send Antivirus Avoiding Malware
A Google ads malvertising campaign was found using KoiVM virtualization technology to install the Formbook data stealer without being spotted by antiviruses. MalVirt loaders are promoted by threat actors in advertising that appears to be for the Blender 3D program.…
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
BOSTON–(BUSINESS WIRE)–Corvus Insurance, the leading provider of Smart Cyber Insurance® products powered by AI-driven risk data, announced today its all-in-one cyber underwriting platform that arms underwriters with predictive data-driven insights. With the help of Corvus Risk Navigator, underwriters are able…
Intel Cuts Pay For Staff, Executives
Salaries for mid-level staff and senior management at Intel have been cut after it posted lower-than-expected sales forecast This article has been indexed from Silicon UK Read the original article: Intel Cuts Pay For Staff, Executives
US Official Confirms Japan, Netherlands Joined US China Chip Sanctions
American official acknowledges deal with Japan and the Netherlands for new restrictions on chip-making tool exports to China This article has been indexed from Silicon UK Read the original article: US Official Confirms Japan, Netherlands Joined US China Chip Sanctions
Amazon Posts Annual Loss, Amid Restructuring
Worse than anticipated earnings for Amazon on Thursday, amid difficulties after pandemic boom and 18,000 job losses This article has been indexed from Silicon UK Read the original article: Amazon Posts Annual Loss, Amid Restructuring
GoAnywhere MFT Users Warned of Zero-Day Exploit
GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet The post GoAnywhere MFT Users Warned of Zero-Day Exploit appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
China Says It’s Looking Into Report of Spy Balloon Over US
The U.S. is tracking a suspected Chinese spy balloon spotted over U.S. airspace, officials said on Feb. 2, 2023. The post China Says It’s Looking Into Report of Spy Balloon Over US appeared first on SecurityWeek. This article has been…
Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
Critical Oracle E-Business Suite vulnerability exploited in attacks shortly after PoC is published. The post Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Breach Corporate Email Accounts
Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious OAuth applications as part of a phishing campaign designed to breach organizations’ cloud environments and steal email. “The applications created by…
Manipulating Weights in Face-Recognition AI Systems
Interesting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“: Abstract: In this paper we describe how to plant novel types of backdoors in any facial recognition model based on the popular architecture of…
Data Privacy Capability Guide
Data privacy is an increasingly important concern for individuals, businesses, and governments worldwide. With the rapid expansion of digital technology and the internet, sensitive information is more vulnerable than ever to unauthorized access, theft, and misuse. As a result, organizations…
29,000 QNAP Devices Unpatched In Critical Vulnerabilities
Over twenty thousand of QNAP network-attached storage (NAS) units are awaiting a patch to fix a serious security hole that was fixed on Monday by the Taiwanese business. This SQL injection vulnerability (CVE-2022-27596) allows remote threat actors to insert malicious…
The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
By Dave Adamson, Chief Technology Officer at Espria Encourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the wake of current geopolitical conflicts. It’s no secret that […] The post The ‘New Cold War’ Continues To Mark…