What are some of the key cybersecurity trends that people and organizations should have on their radars this year? This article has been indexed from WeLiveSecurity Read the original article: Cybersecurity trends and challenges to watch out for in 2024…
Tag: EN
Human Behavior In Digital Forensics, pt II
One the heels of my first post on this topic, I wanted to follow up with some additional case studies that might demonstrate how digital forensics can provide insight into human activity and behavior, as part of an investigation. Targeted…
Experts spotted a new macOS Backdoor named SpectralBlur linked to North Korea
Researchers discovered a macOS backdoor, called SpectralBlur, which shows similarities with a North Korean APT’s malware family. Security researcher Greg Lesnewich discovered a backdoor, called SpectralBlur, that targets Apple macOS. The backdoor shows similarities with the malware family KANDYKORN (aka SockRacket), which was…
Merck settles with insurers regarding a $1.4 billion claim over NotPetya damages
Merck has resolved a dispute with insurers regarding a $1.4 billion claim arising from the NotPetya malware incident. Merck and its insurers have agreed with a $1.4 billion claim arising from the large-scale NotPetya cyberattack. Merck & Co., Inc., known…
Google Disables 30 Million Chrome User Cookies
Eliminating Cookies: Google’s Next Plan Google has been planning to eliminate cookies for years, and today is the first of many planned quiet periods. About 30 million users, or 1% of the total, had their cookies disabled by the Chrome…
23andMe Faces Legal Backlash Over Data Breach and Blames Victims
Facing a deluge of more than 30 lawsuits from individuals impacted by a substantial data breach, genomics company 23andMe has taken a defensive stance by placing responsibility on the victims themselves. The breach came to light in October when customer…
Orbit Chain Loses $86M in Cross-Chain Bridge Hack
Orbit Chain, a South Korean platform designed to act as a multi-asset blockchain hub, revealed a massive breach on December 31, 2023. The company disclosed an “unidentified access to Orbit Bridge,” its decentralised cross-chain technology, which resulted in the…
Patient Privacy in Focus: Healthcare’s Cyber Challenges
Amidst the rapid evolution of technology in healthcare, a crucial focus has come to light: the security of medical devices. Let’s explore the intricacies of this issue together, understanding its importance and finding the right balance between advancing technology and…
Estes Declines Ransom Demand Amidst Personal Data Breach and Theft
Estes Express Lines, a major private freight shipping company in the United States, has notified over 20,000 customers about a security breach where their personal information was stolen by unknown hackers. The company revealed that on October 1, 2023,…
Russia Hacks Surveillance Cameras to Monitor Attacks in Kyiv
During Tuesday’s intense missile and drone strikes on Ukraine’s capital, Kyiv, which left over 250,000 people without internet or electricity amid dropping winter temperatures, Russian military intelligence broke into surveillance cameras to spy on Ukrainian air defenses and Kyiv’s vital…
Law firm Orrick data breach impacted 638,000 individuals
Law firm Orrick, Herrington & Sutcliffe disclosed a data breach that took place in early 2023, which impacted roughly 600,000 individuals. The law firm Orrick, Herrington & Sutcliffe, disclosed a data breach that impacted 638,000 individuals. An authorized actor gained…
23andMe Blames Users for Recent Data Breach as It’s Hit With Dozens of Lawsuits
Plus: Russia hacks surveillance cameras as new details emerge of its attack on a Ukrainian telecom, a Google contractor pays for videos of kids to train AI, and more. This article has been indexed from Security Latest Read the original…
Ransomware payment ban: Wrong idea at the wrong time
Won’t stop the chaos, may lead to attacks with more dire consequences Opinion A general ban on ransomware payments, as was floated by some this week, sounds like a good idea. Eliminate extortion as a source of criminal income, and…
Regenerate and Conquer: Wolverine’s Real-Time Damage System to Dominate the Gaming Landscape
Marvel’s Wolverine has leaked details which suggest that the game will use advanced features, even those that are not available on current PlayStation 5 hardware, to play the game. In the recent Insomniac data breach, a new rumour has…
Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a Türkiye-nexus threat actor known as Sea Turtle. “The infrastructure of the…
Cyber Kidnapping: A Digital Nightmare
The Cyber Threat Actors Use Social Engineering Tactics For Cyber Kidnapping. Imagine this: your child is playing a… The post Cyber Kidnapping: A Digital Nightmare appeared first on Hackers Online Club (HOC). This article has been indexed from Hackers Online…
Pro-Iranian Hacker Group Targeting Albania with No-Justice Wiper Malware
The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come from cybersecurity company ClearSky, which said the Windows-based malware “crashes the operating system in a way that it cannot be rebooted.” The intrusions have been…
Cybersecurity for Art and Design Schools
In the digital age, art and design schools face unique cybersecurity challenges. As technology becomes increasingly integrated into creative education, these institutions must be aware… The post Cybersecurity for Art and Design Schools appeared first on Security Zap. This article…
The Role of AI in Personalized Learning
Artificial Intelligence (AI) is playing an increasingly significant role in the field of education, particularly in personalized learning. As traditional approaches to education become outdated,… The post The Role of AI in Personalized Learning appeared first on Security Zap. This…
What Is OAuth 2.0?
OAuth 2.0 is an authorization framework that enables users to safely share their data between different applications. It is an industry standard that addresses the API security concerns associated with sharing user credentials while providing simple, well-defined authorization flows for…