The NIS 2 Directive is a set of cybersecurity guidelines and requirements established by the European Union (EU) . It replaces and repeals the NIS Directive (Directive 2016/1148/EC) . The full name of the directive is “Directive (EU) 2022/2555 of the European…
Tag: EN
Mr. Green Gaming – 27,176 breached accounts
In March 2024, the online games community Mr. Green Gaming suffered a data breach that exposed 27k user records. Acknowledged on their Discord server, the incident exposed email and IP addresses, usernames, geographic locations and dates of birth. This article…
Introducing Dionaea with Darwis Threat Intel API Integration
Cyber Security and Privacy Foundation is pleased to inform that we have made opensource and made available our panel and code for integrating dionaea with our threat intel API. This can be used as a honeypot to gain insight on…
Home Security Cameras: Choosing and Using Them Wisely
Need help choosing the perfect home security camera? Discover the essential features and placement tips to protect your home effectively. The post Home Security Cameras: Choosing and Using Them Wisely appeared first on Security Zap. This article has been indexed…
Home Data Backup Strategies: Protecting Important Files
Are your important files protected? Discover the best home data backup strategies to safeguard your data and ensure its safety. The post Home Data Backup Strategies: Protecting Important Files appeared first on Security Zap. This article has been indexed from…
U.S. Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp
A U.S. Court ordered surveillance firm NSO Group to hand over the source code for its Pegasus spyware and other products to Meta. Meta won the litigation against the Israeli spyware vendor NSO Group, a U.S. Judge ordered the surveillance firm to…
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year This article has been indexed from WeLiveSecurity Read the…
Piloting new ways of protecting Android users from financial fraud
Posted by Eugene Liderman, Director of Mobile Security Strategy, Google From its founding, Android has been guided by principles of openness, transparency, safety, and choice. Android gives you the freedom to choose which device best fits your needs, while also…
USENIX Security ’23 – Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem
Authors/Presenters: Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s…
Microsoft Copilot for Finance: Transforming Financial Workflows with AI Precision
In a groundbreaking move, Microsoft has unveiled the public preview for Microsoft Copilot for Finance, a specialized AI assistant catering to the unique needs of finance professionals. This revolutionary AI-powered tool not only automates tedious data tasks but also…
GitHub Vulnerability Exposes Millions to RepoJacking Threat
A recent study conducted by Massachusetts-based cloud-native security firm Aqua has shed light on a concerning vulnerability present in millions of software repositories hosted on GitHub. This vulnerability, dubbed RepoJacking, poses a significant threat to repositories belonging to esteemed organizations…
U.S. authorities charged an Iranian national for long-running hacking campaign
The U.S. DoJ charged Iranian national Alireza Shafie Nasab for his role in attacks targeting U.S. government and defense entities. The U.S. Department of Justice (DoJ) charged Iranian national Alireza Shafie Nasab (39) for multi-year hacking campaign targeting U.S. defense…
Linux Malware GTPDOOR Exploits GPRS Roaming Networks to Target Telecom Companies
Security analysts have uncovered a fresh Linux malware named GTPDOOR, intended for deployment within telecom networks adjacent to GPRS roaming exchanges (GRX). What distinguishes this malware is its utilization of the GPRS Tunnelling Protocol (GTP) for commanding and controlling…
WordPress and Tumblr Intends to Sell User Content to AI Firms
Automattic, the parent company of websites like WordPress and Tumblr, is in negotiations to sell training-related content from its platforms to AI firms like MidJourney and OpenAI. Additionally, Automattic is trying to reassure users that they can opt-out at…
The “Mother of All Breaches”: Implications for Businesses
In the vast digital landscape, data breaches have become an unfortunate reality. However, some breaches stand out as monumental, and the recent discovery of the “mother of all breaches” (MOAB) is one such instance. Let’s delve into the details of…
The Privacy Danger Lurking in Push Notifications
Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code of its Pegasus spyware, and an investigation finds widely available security cams are wildly insecure. This article has been indexed from Security Latest Read…
Savvy Seahorse: The DNS-based Traffic Distribution System Undermining Cybersecurity
In the vast landscape of cyber threats, a new player named Savvy Seahorse has emerged, showcasing a distinctive modus operandi that sets it apart from its counterparts. While the investment scam it orchestrates is unfortunately commonplace, it’s the intricate…
Epic Games Faces Alleged Ransomware Attack
Recently, Epic Games, the renowned publisher of Fortnite, is reportedly under threat from a hacking group named Mogilevich. However, the legitimacy of this ransomware attack is yet to be confirmed. Epic Games has stated that they are actively investigating…
New Bifrost RAT Variant Targets Linux Devices, Mimics VMware Domain
By Waqas Bifrost RAT, also known as Bifrose, was originally identified two decades ago in 2004. This is a post from HackRead.com Read the original post: New Bifrost RAT Variant Targets Linux Devices, Mimics VMware Domain This article has been…
Some Doorbell Cameras Sold on Amazon and Other Online Sites Have Major Security Flaws, Report Says
Major vulnerabilities were found in cameras manufactured by the Chinese company Eken Group Ltd., which produces video doorbells under the brand names EKEN and Tuck, among others. The post Some Doorbell Cameras Sold on Amazon and Other Online Sites Have…