All Articles (2238)

Sort by

13052906272?profile=RESIZE_400xResearchers at Microsoft discovered a new macOS vulnerability, “HM Surf” (CVE-2024-44133), which bypasses TCC protections, allowing unauthorized access to sensitive data like the camera and microphone. Patch now to stay protected.  A vulnerability discovered by cybersecurity researchers at Microsoft Threat Intelligence in macOS allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, granting unauthorized access to sensitive user data.

Researchers ca

13048261492?profile=RESIZE_400xRecently, cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks.  "Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the open-source landscape," Checkmarx researchers Yehuda Gelb and Elad Rapaport said in a report.[1]

The software supply chain security company noted

13048238470?profile=RESIZE_400xAccording to cybersecurity provider Cyble, a new sophisticated malicious campaign is using an undetected Cerberus Android banking Trojan payload. In a new report published on 14 October 2024, Cyble Research and Intelligence Labs (CRIL) https://cyble.com identified 15 malicious samples posing as Chrome and Play Store apps from mid-September through the end of October. These samples use a multi-stage dropper to deploy a banking trojan payload, which was found to be leveraging the Cerberus banking

13041430264?profile=RESIZE_400xChina’s Computer Virus Emergency Response Center has released part three of a running series claiming that the US government is actually behind Volt Typhoon activity, rather than China.  The latest CVERC report, whose front page includes an oddly edited photo with the text “Lie to Me,” provides no new evidence of these claims and rehashes old, leaked US intelligence documents.  However, this CVERC report is not useless.  The CVERC report tells us more about China’s intentions than it does convin

13041368054?profile=RESIZE_400xA European Commission-funded biometric “gait recognition” program to study how to more easily identify people crossing the European Union’s external borders by examining their unique walking styles began last week.  The initiative, called the PopEye Project, is supported by a €3.2 million (USD $3.5 million) grant that covers a three-year pilot testing the technology, according to TechTransfer, a program at the Vrije Universiteit Brussels and a partner on the effort.  Horizon Europe, a European U

13044342875?profile=RESIZE_400xThe US Department of Justice (DoJ) has announced arrests and charges against several individuals and entities for allegedly manipulating digital asset markets as part of a widespread fraud operation. The law enforcement action, codenamed Operation Token Mirrors, is the result of the US Federal Bureau of Investigation (FBI) taking the "unprecedented step" of creating its own cryptocurrency token and company, NexFundAI.

NexFundAI, as per information on the website, was marketed as redefining the "

13031403256?profile=RESIZE_400xIranian hackers are acting as Initial Access Brokers (IAB), selling access to critical infrastructure organizations in the West to the highest bidder.  A joint security advisory recently published by the US Cybersecurity and Infrastructure Agency (CISA), together with the FBI, NSA, the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ASCS), claims Iranian threat actors are activel

13031381890?profile=RESIZE_400xKroger’s plans to roll out facial recognition tools at its grocery stores is attracting increased criticism from lawmakers, who warn that it could be exploited to increase the prices certain individuals pay for food and put customers’ personal data at risk.  In a letter this week to Kroger CEO Rodney McMullen, Congresswoman Rashida Tlaib (D-MI) said the plans, which involve using facial recognition tools in digital displays to target advertising to customers and collect information on them, pote

13029801269?profile=RESIZE_400xThreat Type: Foreign Adversarial Technological, Physical, and Cyber Influence

Geographic Area: Worldwide

This advisory supersedes and cancels US Maritime Advisory 2024-002

  1. Issue: This Advisory seeks to alert maritime stakeholders of potential vulnerabilities to maritime port equipment, networks, operating systems, software, and infrastructure. Foreign companies manufacture, install, and maintain port equipment that creates vulnerabilities to global maritime infrastructure information technology

13028514873?profile=RESIZE_400xRecently, the Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world's largest and longest-running dark web market for illegal goods, drugs, and cybercrime services.  The takedown is the result of a collaborative investigation with Ireland, the United Kingdom, and the United States that began towards the end of 2022, the disclosure reported.  The marketplace discontinued its operations in late 2023 following reports of service disruptions and exit

13028435864?profile=RESIZE_400xThe Internet Archive has come back online, in slightly degraded mode, after repelling an 9 October DDoS attack and then succumbing to a raid on users' data.  For several days after the attack, the Archive loaded into the basic page depicted below.

Currently, it is seen that the site sometimes load that page, but sometimes load another that's closer to the Archive's usual busy home page, but omits many items.  It is unclear why the site is switching between the two (and yes, we cleared caches and

13029804065?profile=RESIZE_400xIn today’s interconnected world, safeguarding critical infrastructure from cyber threats is more important than ever.  The continuous evolution of technology and the adoption of the Connected Worker have created unprecedented opportunities for growth and innovation.  However, they have also created a vast and complex digital landscape where vulnerabilities can be easily exploited.  The cybersecurity challenges facing critical infrastructure are not hypothetical; they are stark realities that can

13029781865?profile=RESIZE_400xA new attack technique that relies on radio signals from memory buses to exfiltrate data from air-gapped systems has been identified. The exploit is a novel side-channel attack that has been found to leverage radio signals emanated by a device's Random Access Memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks.  Air-gapped systems, typically used in mission-critical environments with exceptionally high-security requirements, such as governments, weapon systems,

13028691497?profile=RESIZE_400xThe US election cycle is here, and it is becoming more important for voters not to be fooled by Deepfakes.  According to recent research, just over half of Britons surveyed (53%) either have not heard of the term Deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them.  Meanwhile, two in five have encountered at least one deepfake in the past six months, as recent reports reveal that over 4k celebrities have fallen victim to Deepfakes, and 400 di

13027365063?profile=RESIZE_400xSome television stations and websites in Russia are offline for the second day in a row following what Moscow called an “unprecedented” attack on its digital infrastructure.  The disruption began on October 7, Russian President Vladimir Putin’s birthday.  Last week, Russian state-owned broadcaster VGTRK’s website and digital streaming services went off the air.  The affected outlets included radio stations and TV channels such as Russia-1 and Russia-24.  “Our state media holding, one of the larg

13023981683?profile=RESIZE_400xIt is not the federal government that’s responsible for the cyber defense of critical infrastructure.  The responsibility falls on the critical infrastructure operators themselves and most aren’t equipped for the fight.  Cyber threats to the United States' critical infrastructure are on the rise.  On 31 January 2024, FBI Director Christopher Wray testified before Congress, highlighting how Chinese government hackers are attempting “‘to find and prepare to destroy or degrade the civilian critical

13027416478?profile=RESIZE_400xDespite current of law enforcement action to take down ransomware gangs, Secureworks has observed a 30% year-on-year rise in active ransomware groups.   In the eighth edition of the Secureworks annual State of The Threat Report[1], the firm identified 31 new groups that had entered the ransomware ecosystem in the last 12 months.  The report noted that while a few big players had previously dominated the threat landscape, it is now home to a broader set of emerging entities.[2]

The top four most

13024026055?profile=RESIZE_400xIn today’s world, cars are not just machines that take us from one place to another. They have transformed computers into wheels, packed with technology for navigation, entertainment, and safety. However, this technology also comes with a dark side: cyber-attacks.  As vehicles become more connected through the Internet of Things (IoT), they are increasingly vulnerable to hackers.  Understanding how these attacks happen, and their potential consequences is crucial in our technologically advanced

13003752263?profile=RESIZE_400xWith new rules on Cyber Security coming down from the US Coast Guard, Angeliki Zisimatou, Director Cybersecurity, ABS, is uniquely positioned to discuss maritime cyber security in the round, with insights on what she’s seen and heard from the draft rules, with advice on what it could mean for vessel owners.  Cyber security and all that it entails is quickly climbing the priority ladder in maritime, as increasing dependance on connectivity is a double edge sword of promise and peril.  While the l

12999092858?profile=RESIZE_400xEarlier this week, a US federal judge ordered Google to tear down the digital walls shielding its Android app store from competition as punishment for maintaining an illegal monopoly that helped expand the company's internet empire.  The injunction was issued by US District Judge James Donato and will require Google to make several changes that the California company had been resisting.  Those include a provision that will require its Play Store for Android apps to distribute rival third-party a