All Articles (2745)

Sort by

12861694454?profile=RESIZE_400xAutoCanada https://www.autocan.ca  a major Canadian car dealership, this week disclosed a cyberattack that may result in some disruptions. The incident was discovered on 11 August 2024, and it impacted some internal IT systems, the company reported.

See:  https://redskyalliance.org/xindustry/north-american-auto-dealers-impacted

“Immediately upon detecting the incident, AutoCanada took action to safeguard its network and data. This included engaging with leading cybersecurity experts to assist us

Views: 40
Comments: 0

12861690887?profile=RESIZE_400xSecurity researchers at Palo Alto Networks have spotted a threat actor extorting organizations after compromising their cloud environments using inadvertently exposed environment variables. As part of the large-scale extortion campaign, Palo Alto Networks warned that the attackers targeted 110,000 domains through exposed .env files containing sensitive information, which were stored on unsecured web applications and misconfigured servers.  These .env files allow organizations to define configura

12860602665?profile=RESIZE_400xThe US Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install (SMI) feature to access sensitive data.  The agency said it has seen adversaries "acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature."  It also said it continues to observe weak passwords used on Cisco network devices, thereby exposing them to password-cracking at

12860590488?profile=RESIZE_400xMicrosoft was anxious to put generative AI at the heart of its systems.  Ask a question about an upcoming meeting, and the company’s Copilot AI system can pull answers from your emails, Teams chats, and files, a potential productivity boon.  However, these exact processes can also be abused by hackers.   On 08 August 2024, at the Black Hat security conference in Las Vegas, researcher Michael Bargury demonstrated five proof-of-concept ways that Copilot, which runs on its Microsoft 365 apps, such

12810256258?profile=RESIZE_400xCyber-spies suspected of connections with China have infected "dozens" of computers belonging to Russian government agencies and IT providers with backdoors and trojans since late July, according to Kaspersky.  The Russia-based security biz claimed the malware used in the ongoing, targeted attacks, called EastWind, has links to two China-nexus groups tracked as APT27 and APT31. 

After gaining initial access to their victims' devices via phishing emails, the attackers used various cloud services

12811792085?profile=RESIZE_400xThe phrase “practice makes perfect” is usually reserved for humans, but it is also a great maxim for robots newly deployed in unfamiliar environments.  Think of a robot arriving in a warehouse. It comes packaged with the skills it was trained in, like placing an object, and now it needs to pick items from a shelf it is not familiar. At first, the machine struggles with this, since it needs to get acquainted with its new surroundings. To improve, the robot will need to understand which skills wit

Views: 36
Comments: 0

12811540677?profile=RESIZE_400xThe US Cybersecurity and Infrastructure Security Agency (CISA) has taken a pioneering step in the realm of artificial intelligence and cybersecurity by appointing its first Chief Artificial Intelligence Officer, and it is not a computer, Lisa Einstein.  This position, announced on 01 August 2024, underscores the growing importance of AI in national security and sets a precedent that other organizations may soon follow.

Einstein has served as CISA's Senior Advisor for AI since 2023 and as the Exe

12810213660?profile=RESIZE_400xA massive data leak exposed 1.4 billion Tencent user accounts. The data includes emails, phone numbers, and QQ IDs potentially linked to the “Mother of All Breaches” (MOAB).

A threat actor named “Fenice” has leaked 1.4 billion user accounts, which they claim belong to Tencent (Tencent.com), a Chinese internet giant and technology company.

Tencent is widely recognized for its diverse services, including social networks, music streaming, web portals, e-commerce, mobile games, internet services, pa

12804526294?profile=RESIZE_400xX has had its own AI chatbot, Grok, for a while, but it would be fair to say it's not mentioned in the same way that OpenAI's ChatGPT or Google Gemini are.  That's not for the want of trying, though, and with a huge user base of X users providing data for the model, a new version was always expected.

Now, the obviously-named Grok-2 has entered beta.  In a new blog post, X says it represents "a significant step forward from our previous model Grok-1.5, featuring frontier capabilities in chat, cod

12805046081?profile=RESIZE_400xA US federal judge ruled on 05 August 2024 that Google violated antitrust laws as it built its Internet search business. The decision might have major implications for the way people use the Internet. The court ruled that payments to make Google the default search engine on other browsers broke US antitrust rules, enabling Google to become a monopoly. The court further ruled that Google had acted illegally to suppress its competition and maintain a monopoly on online search and related highly lu

12801293099?profile=RESIZE_400xAs part of ongoing growth and digital transformation, many enterprises encounter the challenge of managing the exposures that come with integrating managed assets, BYOD policies, cloud resources, shadow IT, and IoT devices. Each of these new technologies introduces their own set of vulnerabilities and potential entry points for malicious actors, adding to the complexity of maintaining a robust security posture.

In this kind of fragmented environment, security teams have a harder time gaining a c

12768125499?profile=RESIZE_400xWith the general election a few months away and presidential candidates aggressively fundraising before Election Day, election-related scams are likely to become increasingly common, according to Thomas Dearden, an associate professor of sociology at Virginia Tech.  Because political donations increase at this time of an election year, it’s an opportune time for scammers to take advantage, he said.  “This is one of those ways that they can develop illegitimate opportunities to donate,” Dearden s

12798039083?profile=RESIZE_180x180“Vote early and often” has been attributed to one of Illinois’ noted gangsters, Al Capone.  Databases containing sensitive US voter information from multiple counties in Illinois were openly accessible on the Internet, revealing 4.6 million records.  Cyber Researcher Jeremiah Fowler has discovered.  These included driver's license numbers as well as full and partial Social Security Numbers and documents like death certificates and included voter records, ballots, multiple lists, and election-rel

12798018479?profile=RESIZE_400xRU President Vladimir recently offered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops. The democratically elected Ukraine government swiftly rejected these terms.   However, the Russian offer suggests that they do not see a near-term military victory in the disputed territory, which could be the motive behind the evolution of its cyberwar tactics in the overall military

12790441095?profile=RESIZE_400xIranian state-backed actors have sought to access senior US political figures’ email accounts and launched “covert news sites” aimed at US readers as part of an increase in disinformation and cyber-attacks ahead of the country’s elections, Microsoft has said.  A group run by Iran’s Revolutionary Guards in June sent a spear-phishing email, or personalized hacking attempt, to a “high-ranking official of a presidential campaign” from the compromised email account of a former senior adviser, the Mic

12767226452?profile=RESIZE_400xADT Inc. said on 8 August a small percentage of its customers’ email addresses, phone number and postal addresses were stolen in a recent cybersecurity breach.  The security company that provides residential and small business electronic security, fire protection, and other related alarm monitoring services throughout the US said it took prompt steps to shut down unauthorized access to databases of customer order information.[1]

The company said it has no reason to believe any banking or credit

12763818094?profile=RESIZE_400xInternal documents from Leidos Holdings Inc.[1] a leading IT services provider to various US government agencies including the Defense Department have been leaked online by hackers.  The documents are believed to have been exfiltrated during a breach of a system operated by Diligent Corp., https://www.diligent.com which Leidos used for its operations.

The breach was initially reported earlier this year when Diligent Corp., a company providing governance, risk, and compliance (GRC) software, suff

12765190863?profile=RESIZE_400xA new security report released this week revealed a record-breaking $75 million ransom paid by a single victim to the Dark Angels ransomware gang earlier this year.  The payment surpasses the previous highest known ransom of $40 million paid by insurance giant CNA to Evil Corp.  The specific company involved has not been disclosed at the time of this writing. However, there are speculations that pharmaceutical giant Cencora ranked #10 on the Fortune 50 list, experienced a cyberattack in February

12761979853?profile=RESIZE_400xThe government of Columbus, Ohio said it is aware of claims made by a ransomware gang that troves of sensitive city information are available for sale.  The Rhysida ransomware group took credit on Wednesday for the 18 July, threatening to leak 6.5 terabytes of exfiltrated information from the city’s systems allegedly containing emergency services data, access to city cameras and more.

A city spokesperson said late last week they are aware of the matter but could not comment, adding that the situ

12761861691?profile=RESIZE_400xLast week, some of Microsoft’s apps were knocked offline in an intentional cyber-attack, it said in an update.  The company’s attempts to stop the hack amplified it.  That meant that some of its apps and features were offline for much of 31 July.  It came just days after Windows PCs were hit by a huge outage that brought much of the world to a standstill, cancelling flights and delaying hospital appointments.  That was the result of a bug in cybersecurity software made by third-party company Cro