A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Most…
Week in review: ChatGPT as an infosec assistant, Google offers help to EU cybersecurity startups
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google is calling EU cybersecurity founders Google announced that the Google for Startups Growth Academy: Cybersecurity program now accepts applications from EU companies. Rackspace ransomware…
Cyber Security Management System (CSMS) for the Automotive Industry
The biggest risks of using Bluetooth trackers like Apple AirTag, Tile
While Bluetooth tracking devices like Apple AirTag, Tile and Samsung SmartTag are helping find keys and wallets, they're also being used to stalk people. This article has been indexed from Cybersecurity Read the original article: The biggest risks of using…
The biggest security pros and cons of using Bluetooth trackers
While Bluetooth tracking devices are helping people find their keys and wallet, they're also being used to stalk people. This article has been indexed from Cybersecurity Read the original article: The biggest security pros and cons of using Bluetooth trackers
DevSecOps and Digital Transformation: Bridging the Security Gap
How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […] The post DevSecOps and Digital Transformation: Bridging the Security…
SpiderOak raises $16.4 million to protect space mission systems
SpiderOak has raised $16.4M in Series C round led by Empyrean Technology Solutions, a space technology platform backed by funds affiliated with Madison Dearborn Partners. The Series C round included additional investment from Method Capital, and OCA Ventures. The oversubscribed…
Crisis24 acquires Topo.ai to enhance global risk intelligence capabilities
Crisis24 acquires Topo.ai to further strengthen its support operations, offer a one-stop shop solution with plug and play capabilities, and ensure the highest levels of client satisfaction. Crisis24 provides unrivaled curated intelligence and sophisticated technologies to enable the world’s most…
Conceal joins forces with Thousand Guards to improve web-browser security
Conceal has unveiled that it is expanding into the Spain, France, Italy, and Portugal MSSP markets through a strategic partnership with Thousand Guards. “Thousand Guards services are aimed at IT security managers and cybersecurity services companies that need to find…
Most internet-exposed Cacti servers exposed to hacking
Most internet-exposed Cacti servers are vulnerable to the critical vulnerability CVE-2022-46169 which is actively exploited in the wild. Cacti is an open-source platform that provides a robust and extensible operational monitoring and fault management framework for users. Researchers from Censys…
NSA asks Congress to let it get on with that warrantless data harvesting, again
Also: That Pokemon is actually a RAT, Uncle Sam fails a password audit In brief A US intelligence boss has asked Congress to reauthorize a controversial set of powers that give snoops warrantless authorization to surveil electronic communications in the…
Europol Busts Crypto Fraud Call Centers
By Deeba Ahmed The operation took place all over Europe including Serbia, Bulgaria, Germany, and Cyprus. This is a post from HackRead.com Read the original post: Europol Busts Crypto Fraud Call Centers This article has been indexed from HackRead |…
Booklist Review of A Hacker’s Mind
Booklist reviews A Hacker’s Mind: Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a “hack” as an activity allowed by a system “that subverts the rules or norms of the system […] at the expense of someone…
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The Coming AI Hackers” and will be held Friday, February 3…
The biggest security pros and cons of using Bluetooth GPS trackers
While Bluetooth tracking devices are helping people find their keys and wallet, they're also being used to stalk people. This article has been indexed from Cybersecurity Read the original article: The biggest security pros and cons of using Bluetooth GPS…
Seasons Greetings from (ISC)2
Dear (ISC)² Members, Associates and Candidates: I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together. Launching an entry-level certification…
Report: Crypto Crime Hits Record $20 Billion in 2022
The unlawful use of cryptocurrencies reached a new high of $20.1 billion last year, as transactions involving companies sanctioned by the United States skyrocketed, as per data from blockchain analytics firm Chainalysis released on Thursday. In 2022, the cryptocurrency…
Goodbye, Passwords; Here is What Will Happen Next
We all have way too many passwords, and they probably are not nearly as secure as we believe. Passkeys are the next step in the evolution of passwords and aim to make passwords obsolete in favour of a more…
Is AI Transforming the Cybersecurity Sector?
Artificial intelligence and machine learning (AI/ML) systems have proven to be effective in improving the sophistication of phishing lures, creating fake profiles, and developing basic malware. Security experts have demonstrated that a complete attack chain may be established, and malicious…
Dark Pink: New APT Group Targets Asia-Pacific, Europe With Spear Phishing Attacks
A new wave of advanced persistent threat (APT) attacks has been discovered, that is apparently launched by a threat group named Dark Pink. The attack was launched between June and December 2022 and has been targeting countries in the Asia-Pacific,…
The Treasury of the United Kingdom Considers the Digital Pound Plan
Several proposals are being considered by the government, including the introduction of a “digital pound,” according to the Treasury’s economic secretary. According to Andrew Griffith, the UK intends to become a world leader in the cryptocurrency industry. There was…
Top 5 stories of the week: ChatGPT, CES and cybersecurity advice from AWS
A roundup of the top 5 stories this week, including AI at CES and coming soon to Microsoft Office, and security advice from AWS. This article has been indexed from Security News | VentureBeat Read the original article: Top 5…
Russian Ransomware Gang Attack Destabilizes UK Royal Mail
Plus: Joe Biden’s classified-documents scandal, the end of security support for Windows 7, and more. This article has been indexed from Security Latest Read the original article: Russian Ransomware Gang Attack Destabilizes UK Royal Mail
French CNIL fined Tiktok $5.4 Million for violating cookie laws
French data protection watchdog fined short-form video hosting service TikTok €5 million for breaking cookie consent rules. The Commission nationale de l’informatique et des libertés (CNIL) has fined short-form video hosting service TikTok €5 million (about $5.4 million) for violating cookie consent rules.…
Cacti Servers Under Attack as Majority Fail to Patch Critical Vulnerability
A majority of internet-exposed Cacti servers have not been patched against a recently patched critical security vulnerability that has come under active exploitation in the wild. That’s according to attack surface management platform Censys, which found only 26 out of a total…
Malware Attack on CircleCI Engineer’s Laptop Leads to Recent Security Incident
DevOps platform CircleCI on Friday disclosed that unidentified threat actors compromised an employee’s laptop and leveraged malware to steal their two-factor authentication-backed credentials to breach the company’s systems and data last month. The CI/CD service CircleCI said the “sophisticated attack”…