#cybersecurity

[ follow ]
#hacking

Apple May Owe You $20 in a Siri Privacy Lawsuit Settlement

Cybersecurity breaches continue to escalate, with notable incidents involving key government institutions and serious online threats persisting into the new year.

Chinese-sponsored hackers accessed Treasury documents in 'major incident'

Chinese government-aligned hackers compromised Treasury Department workstations via a third-party provider in a significant cybersecurity incident.

The US Treasury Department says it was hacked in a China-linked cyberattack

A major cybersecurity incident occurred at the US Treasury, linked to a Chinese state-sponsored attack, with unauthorized access to documents and workstations.

US Treasury hacked: Are China and the US stepping up their cyberwar?

The US Treasury accuses China of a significant cyber breach, leading to unclassified document access amidst escalating cyber tensions.

US Treasury says it was breached by Chinese-backed hacker

The U.S. Treasury Department was hacked by a Chinese state-sponsored actor via a third-party software provider, marking a significant cybersecurity incident.

US sanctions Beijing-based cyber group for its alleged role in hacking incidents

U.S. sanctions target Beijing cybersecurity firm for involvement in hacking U.S. infrastructure.

Apple May Owe You $20 in a Siri Privacy Lawsuit Settlement

Cybersecurity breaches continue to escalate, with notable incidents involving key government institutions and serious online threats persisting into the new year.

Chinese-sponsored hackers accessed Treasury documents in 'major incident'

Chinese government-aligned hackers compromised Treasury Department workstations via a third-party provider in a significant cybersecurity incident.

The US Treasury Department says it was hacked in a China-linked cyberattack

A major cybersecurity incident occurred at the US Treasury, linked to a Chinese state-sponsored attack, with unauthorized access to documents and workstations.

US Treasury hacked: Are China and the US stepping up their cyberwar?

The US Treasury accuses China of a significant cyber breach, leading to unclassified document access amidst escalating cyber tensions.

US Treasury says it was breached by Chinese-backed hacker

The U.S. Treasury Department was hacked by a Chinese state-sponsored actor via a third-party software provider, marking a significant cybersecurity incident.

US sanctions Beijing-based cyber group for its alleged role in hacking incidents

U.S. sanctions target Beijing cybersecurity firm for involvement in hacking U.S. infrastructure.
morehacking
#encryption

Encryption backdoor debate 'done and dusted'

The US government has reversed its stance on encryption, urging the use of strong encryption for secure communications following significant cyber breaches.

Encryption: Ciphers, Digests, Salt, and IV - What You Need to Know | HackerNoon

Encryption secures data by making it accessible only through decryption, crucial for data protection against unauthorized access.

Encryption backdoor debate 'done and dusted'

The US government has reversed its stance on encryption, urging the use of strong encryption for secure communications following significant cyber breaches.

Encryption: Ciphers, Digests, Salt, and IV - What You Need to Know | HackerNoon

Encryption secures data by making it accessible only through decryption, crucial for data protection against unauthorized access.
moreencryption

Tenable CEO Amit Yoran dies | TechCrunch

Amit Yoran, a significant figure in cybersecurity and CEO of Tenable, passed away after a cancer battle.

Marketing for cybersecurity tech is often fear-based. Here's how that backfires

Cybersecurity marketing creates a fear-driven user cycle that fosters helplessness and insecurity rather than empowering individuals to understand and manage their online safety.
#phishing

AI-generated phishing emails are getting very good at targeting executives

AI enhances phishing attacks, making them more sophisticated and effective against defenses.

Gmail, Outlook and Apple users urged to watch out for this new email scam: Cybersecurity experts sound alarm

AI is being maliciously used to create hyper-personalized scam emails that deceive victims easily.

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

PLAYFULGHOST malware poses a significant cybersecurity threat with advanced data-gathering and persistence capabilities, employing innovative attacks via phishing and trojanized applications.

AI-generated phishing emails are getting very good at targeting executives

AI enhances phishing attacks, making them more sophisticated and effective against defenses.

Gmail, Outlook and Apple users urged to watch out for this new email scam: Cybersecurity experts sound alarm

AI is being maliciously used to create hyper-personalized scam emails that deceive victims easily.

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

PLAYFULGHOST malware poses a significant cybersecurity threat with advanced data-gathering and persistence capabilities, employing innovative attacks via phishing and trojanized applications.
morephishing
#data-breach

These were the badly handled data breaches of 2024 | TechCrunch

23andMe's massive data breach highlights the need for better security practices and accountability in handling user data.

China-Linked Cyber Threat Group Hacks US Treasury Department

A Chinese cyberattack compromised the U.S. Treasury, gaining access to sensitive information through a third-party vendor, highlighting state-sponsored cyber threats.

Data 1 million customers stolen from jeweller Glamira

Glamira experienced a significant data breach affecting customer personal information, emphasizing risks in online data security.

US treasury's workstations breached in cyber-attack by China report

Chinese state-sponsored hackers breached the US Treasury Department using a compromised third-party cybersecurity service.
Access to sensitive documents was achieved through a stolen security key from BeyondTrust.

Chinese hackers infiltrate US Treasury systems DW 12/31/2024

Chinese state-sponsored hackers breached the US Treasury, compromising workstations and stealing unclassified documents in a significant cybersecurity incident.

The US Treasury says some computers were breached by China-backed hackers

The US Treasury has experienced a major cybersecurity incident involving China-backed hackers, accessing unclassified documents from Treasury workstations.

These were the badly handled data breaches of 2024 | TechCrunch

23andMe's massive data breach highlights the need for better security practices and accountability in handling user data.

China-Linked Cyber Threat Group Hacks US Treasury Department

A Chinese cyberattack compromised the U.S. Treasury, gaining access to sensitive information through a third-party vendor, highlighting state-sponsored cyber threats.

Data 1 million customers stolen from jeweller Glamira

Glamira experienced a significant data breach affecting customer personal information, emphasizing risks in online data security.

US treasury's workstations breached in cyber-attack by China report

Chinese state-sponsored hackers breached the US Treasury Department using a compromised third-party cybersecurity service.
Access to sensitive documents was achieved through a stolen security key from BeyondTrust.

Chinese hackers infiltrate US Treasury systems DW 12/31/2024

Chinese state-sponsored hackers breached the US Treasury, compromising workstations and stealing unclassified documents in a significant cybersecurity incident.

The US Treasury says some computers were breached by China-backed hackers

The US Treasury has experienced a major cybersecurity incident involving China-backed hackers, accessing unclassified documents from Treasury workstations.
moredata-breach
#sanctions

U.S. Hits Chinese Cybersecurity Company With Sanctions After Breach

The U.S. Treasury sanctioned Integrity Technology Group for aiding Chinese hackers in infiltrating U.S. communications systems, amidst growing concerns over cyber espionage.

Treasury sanctions Chinese cyber firm behind mass attack on U.S. routers

The U.S. Treasury imposed sanctions on a Chinese company for its role in the Flax Typhoon cyber attacks affecting thousands of devices, mainly in the U.S.

Chinese government hackers reportedly targeted US Treasury's sanctions office during December cyberattack | TechCrunch

Chinese hackers attacked U.S. Treasury's sanctions office, exposing cybersecurity vulnerabilities and potential national security implications.

US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch

The U.S. sanctioned Integrity Technology Group for its ties to a China-backed hacking operation, Flax Typhoon, impacting U.S. critical infrastructure.

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

OFAC sanctioned Iranian and Russian entities for trying to influence the 2024 U.S. elections through disinformation campaigns.

U.S. Hits Chinese Cybersecurity Company With Sanctions After Breach

The U.S. Treasury sanctioned Integrity Technology Group for aiding Chinese hackers in infiltrating U.S. communications systems, amidst growing concerns over cyber espionage.

Treasury sanctions Chinese cyber firm behind mass attack on U.S. routers

The U.S. Treasury imposed sanctions on a Chinese company for its role in the Flax Typhoon cyber attacks affecting thousands of devices, mainly in the U.S.

Chinese government hackers reportedly targeted US Treasury's sanctions office during December cyberattack | TechCrunch

Chinese hackers attacked U.S. Treasury's sanctions office, exposing cybersecurity vulnerabilities and potential national security implications.

US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch

The U.S. sanctioned Integrity Technology Group for its ties to a China-backed hacking operation, Flax Typhoon, impacting U.S. critical infrastructure.

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

OFAC sanctioned Iranian and Russian entities for trying to influence the 2024 U.S. elections through disinformation campaigns.
moresanctions
#national-security

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

The U.S. DOJ's new rule aims to protect citizens' personal data from being transferred to hostile foreign nations.

China Hacked Treasury Dept. in Major Incident,' U.S. Says

China's state-sponsored actor hacked the U.S. Treasury, gaining access to sensitive systems and documents, underscoring serious security vulnerabilities.

Mindlessly 'Deregulating' U.S. Telecom Contributed to The Worst Hack In U.S. History

U.S. telecom deregulation has compromised broadband quality and security, leading to unprecedented hacking incidents and a national security risk.

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

The U.S. DOJ's new rule aims to protect citizens' personal data from being transferred to hostile foreign nations.

China Hacked Treasury Dept. in Major Incident,' U.S. Says

China's state-sponsored actor hacked the U.S. Treasury, gaining access to sensitive systems and documents, underscoring serious security vulnerabilities.

Mindlessly 'Deregulating' U.S. Telecom Contributed to The Worst Hack In U.S. History

U.S. telecom deregulation has compromised broadband quality and security, leading to unprecedented hacking incidents and a national security risk.
morenational-security
#us-treasury

Treasury's sanctions office hacked by Chinese government, officials say

Chinese government hackers breached the U.S. Treasury's sensitive offices, targeting economic sanctions administration for intelligence on U.S. rivals.

Chinese spies targeted sanctions intel in US Treasury raid

China's cyber espionage targets the US Treasury's sanction enforcement offices.
A vulnerability in BeyondTrust software enabled the security breach.
Immediate remedial actions were taken by BeyondTrust post-incident.

China-linked attack on US Treasury Department reportedly targeted its sanctions office

The US Treasury suffered a major cybersecurity breach linked to state-sponsored Chinese hackers, compromising sensitive offices related to government sanctions.

Beijing denies involvement in US treasury cyber-attack

China denied allegations of state-sponsored cyber attacks on the US Treasury, calling them baseless and politically motivated.

Chinese government hackers targeted US Treasury office that administers sanctions report

Chinese government hackers breached US Treasury's sanction office, targeting sensitive documents and employee workstations, signaling potential concerns over economic sanctions against Chinese entities.

Chinese hackers infiltrate US Treasury in major cyberattack, officials tell Congress

A China-backed actor breached US Treasury systems, but ongoing access was not confirmed.

Treasury's sanctions office hacked by Chinese government, officials say

Chinese government hackers breached the U.S. Treasury's sensitive offices, targeting economic sanctions administration for intelligence on U.S. rivals.

Chinese spies targeted sanctions intel in US Treasury raid

China's cyber espionage targets the US Treasury's sanction enforcement offices.
A vulnerability in BeyondTrust software enabled the security breach.
Immediate remedial actions were taken by BeyondTrust post-incident.

China-linked attack on US Treasury Department reportedly targeted its sanctions office

The US Treasury suffered a major cybersecurity breach linked to state-sponsored Chinese hackers, compromising sensitive offices related to government sanctions.

Beijing denies involvement in US treasury cyber-attack

China denied allegations of state-sponsored cyber attacks on the US Treasury, calling them baseless and politically motivated.

Chinese government hackers targeted US Treasury office that administers sanctions report

Chinese government hackers breached US Treasury's sanction office, targeting sensitive documents and employee workstations, signaling potential concerns over economic sanctions against Chinese entities.

Chinese hackers infiltrate US Treasury in major cyberattack, officials tell Congress

A China-backed actor breached US Treasury systems, but ongoing access was not confirmed.
moreus-treasury

How Android malware can be instantly detected

PermGuard framework enhances Android security by automatically detecting malware through permission mapping, addressing vulnerabilities in the open-source environment.
#malware

Cyberhaven breach caused by malicious Chrome extension

Cyberhaven's Chrome extension was compromised by a phishing attack, affecting 400,000 users with malware that stole sensitive data.

Time to check if you ran any of these 33 malicious Chrome extensions

A spear phishing campaign compromised 20 Chrome extensions, allowing attackers to upload malicious versions and access sensitive credentials.

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT

A malicious npm package was found that installs Quasar RAT, posing a significant threat to developer security and system integrity.

Fake stars undermine GitHub: 4.5 million fraudulent stars discovered

GitHub faces a significant challenge with fake stars, impacting both malicious and non-malicious repositories.
Research indicates that 4.5 million stars on GitHub are believed to be fake, highlighting a widespread issue.

Cyberhaven breach caused by malicious Chrome extension

Cyberhaven's Chrome extension was compromised by a phishing attack, affecting 400,000 users with malware that stole sensitive data.

Time to check if you ran any of these 33 malicious Chrome extensions

A spear phishing campaign compromised 20 Chrome extensions, allowing attackers to upload malicious versions and access sensitive credentials.

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT

A malicious npm package was found that installs Quasar RAT, posing a significant threat to developer security and system integrity.

Fake stars undermine GitHub: 4.5 million fraudulent stars discovered

GitHub faces a significant challenge with fake stars, impacting both malicious and non-malicious repositories.
Research indicates that 4.5 million stars on GitHub are believed to be fake, highlighting a widespread issue.
moremalware
#hipaa

Healthcare data breaches are out of control - here's how the US plans to beef up security standards

The HHS has proposed significant updates to HIPAA's security rule to enhance the protection of healthcare information.

Major cyber news drops under the buzzer for 2024

A ninth U.S. telecom provider was compromised by Chinese hackers, raising concerns about cybersecurity in the telecommunications sector.

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

HHS proposes new cybersecurity measures to enhance protections for electronic health data in healthcare organizations against cyber threats.

Healthcare data breaches are out of control - here's how the US plans to beef up security standards

The HHS has proposed significant updates to HIPAA's security rule to enhance the protection of healthcare information.

Major cyber news drops under the buzzer for 2024

A ninth U.S. telecom provider was compromised by Chinese hackers, raising concerns about cybersecurity in the telecommunications sector.

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

HHS proposes new cybersecurity measures to enhance protections for electronic health data in healthcare organizations against cyber threats.
morehipaa

Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts

Drop-shipping schemes exploit online platforms to sell illegal products, posing risks to consumers and challenges for enforcement.
Meta struggles with consistent ad enforcement despite policies against illegal advertising.

The critical need for secure communications in modern law enforcement

Secure communications in law enforcement are essential due to evolving cyber threats and the challenges presented by traditional and consumer messaging methods.

Creating A Cybersecurity Policy For Remote Workers In 5 Detailed Steps

Remote work increases cybersecurity risks, necessitating robust policies for protection.
Identifying vulnerabilities is crucial for creating effective cybersecurity strategies for remote employees.
#password-security

Your complicated passwords may not be as effective as you think

Longer passwords are more secure than complex passwords, according to new NIST guidelines.

4 things to do to protect yourself online from scams and hacks in the new year

Sophisticated hackers and scammers are evolving their methods, prompting individuals to adopt stronger cybersecurity practices.

Your complicated passwords may not be as effective as you think

Longer passwords are more secure than complex passwords, according to new NIST guidelines.

4 things to do to protect yourself online from scams and hacks in the new year

Sophisticated hackers and scammers are evolving their methods, prompting individuals to adopt stronger cybersecurity practices.
morepassword-security

NetLib Security predictions 2025 | App Developer Magazine

Generative AI significantly impacts privacy rights, requiring users to take proactive steps to safeguard their data. Many default app settings can compromise personal information.

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

Cross-domain attacks are a rising threat, exploiting vulnerabilities in identity and cloud security.
Adversaries are shifting tactics from 'breaking in' to 'logging in' through legitimate credentials.

Atos hits back at ransomware attack claims

Atos denies database compromise claims by Space Bears ransomware, stating no ransom has been demanded.

A Guide to Safeguarding Your Business with the Essential Steps for Security and Resilience

Strong business safeguards are crucial for protection against various threats.

NATO is working to reroute data through space, fearing Russia could slice undersea internet cables

Subsea cables supporting the internet face increased risk of attacks, particularly from Russia, prompting efforts to enhance security.

US sanctions Russian group over AI-generated election disinformation

Federal sanctions target Russian and Iranian groups attempting to interfere in the 2024 presidential election through disinformation campaigns.

New "DoubleClickjacking" Exploit Bypasses Clickjacking Protections on Major Websites

DoubleClickjacking is a new vulnerability exploiting double-clicks to bypass traditional clickjacking protections, threatening major websites.

8 things that shouldn't have happened last year, but did

2024 was a challenging year for major tech companies, highlighting failures and obstacles in delivering reliable services and protecting digital rights.
#crime

A cybersecurity executive was pardoned by Donald Trump. His crime was a mystery.

Chris Wade's past cybercrimes were sealed until Trump pardoned him, provoking inquiries into the reasons behind the secrecy.

New Year's Eve Links: Drive-By Shooting In Antioch

A drive-by shooting in Antioch resulted in extensive property damage but no injuries.

A cybersecurity executive was pardoned by Donald Trump. His crime was a mystery.

Chris Wade's past cybercrimes were sealed until Trump pardoned him, provoking inquiries into the reasons behind the secrecy.

New Year's Eve Links: Drive-By Shooting In Antioch

A drive-by shooting in Antioch resulted in extensive property damage but no injuries.
morecrime

Stress, burnout, and IT - do they have to come as a trio?

Workplace stress in IT can lead to employee burnout, mistakes, and high turnover rates.
#artificial-intelligence

Is AI the missing piece for government agencies to achieve zero trust security?

AI presents opportunities for enhancing zero trust security but requires significant focus on human factors and organizational change to ensure successful implementation.

Twelve tech trends to watch in 2025: The dawn of the convergence era

Technological advancements are converging, with AI evolving from a leading role to a collaborative role among various innovations, signaling a new era.

Buckle up for an odd couple of 2025 government and technology predictions

2024 brought significant technological advancements and persistent cybersecurity challenges, marking a transformative year for government and society.

Is AI the missing piece for government agencies to achieve zero trust security?

AI presents opportunities for enhancing zero trust security but requires significant focus on human factors and organizational change to ensure successful implementation.

Twelve tech trends to watch in 2025: The dawn of the convergence era

Technological advancements are converging, with AI evolving from a leading role to a collaborative role among various innovations, signaling a new era.

Buckle up for an odd couple of 2025 government and technology predictions

2024 brought significant technological advancements and persistent cybersecurity challenges, marking a transformative year for government and society.
moreartificial-intelligence

2025 will be another big year for MSPs as Kaseya CEO teases 'earth-shattering' announcements

Kaseya is transforming the MSP landscape with its innovative security solutions and strategic acquisitions, providing enhanced tools for threat detection and management.

How one man's decision not to work from home saved him from losing $18K to scammers

Terence Ho prevented a scammer theft by wisely deciding to work from the office instead of home, leading to awareness of ongoing fraud.
#china

China's cyber intrusions turns sinister in 2024

China's cyber intrusions indicate a shift towards potential disruptive attacks on US critical infrastructure, moving beyond mere cyberspying.

Biden Admin Reports China Hacked Treasury Department In Major' Breach

Chinese intelligence agency breached the Treasury Department, accessing unclassified documents and workstations, focusing on information-gathering rather than infrastructure sabotage.

China's cyber intrusions turns sinister in 2024

China's cyber intrusions indicate a shift towards potential disruptive attacks on US critical infrastructure, moving beyond mere cyberspying.

Biden Admin Reports China Hacked Treasury Department In Major' Breach

Chinese intelligence agency breached the Treasury Department, accessing unclassified documents and workstations, focusing on information-gathering rather than infrastructure sabotage.
morechina
#russia

The West found a miles-long piece of evidence backing its claim Russia is purposely cutting undersea cables

A Russian ship's anchor may have severed undersea cables in the Baltic, raising fears of deliberate attacks on vital communication infrastructure.

What to know about Finland, Russia's 'shadow fleet' and a severed undersea cable

Russian affiliates may be sabotaging EU infrastructure in response to support for Ukraine.

The West found a miles-long piece of evidence backing its claim Russia is purposely cutting undersea cables

A Russian ship's anchor may have severed undersea cables in the Baltic, raising fears of deliberate attacks on vital communication infrastructure.

What to know about Finland, Russia's 'shadow fleet' and a severed undersea cable

Russian affiliates may be sabotaging EU infrastructure in response to support for Ukraine.
morerussia

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

Microsoft's Azure Data Factory integration with Apache Airflow has critical vulnerabilities that could allow attackers to gain unauthorized access and conduct covert operations.

US Treasury Department Admits It Got Hacked by China

Command injection vulnerabilities persist in 2024, undermining the security of remote access products even for US government use.
Experts urge better cybersecurity measures for critical infrastructure to prevent breaches and espionage.

Zero Trust Network Access (ZTNA): A Useful Framework, but Not A Silver Bullet | HackerNoon

ZTNA enhances security by continuously verifying user identity but should not be seen as a complete security solution.

Huge Volkswagen data leak exposed the locations of 460,000 EV drivers

A Volkswagen software subsidiary experienced a major data leak, exposing personal details of 800,000 EV owners, though no unauthorized access occurred.

API Security Perspectives 2025 report from Kong Inc | App Developer Magazine

AI is increasing security threats to APIs, with many organizations underestimating the risks and lacking essential security measures to combat them.
#data-protection

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach - DevOps.com

SquareX exposes serious vulnerabilities in Chrome extensions, highlighting the need for enhanced monitoring to mitigate ongoing threats in browser security.

Five methods to safeguard your business - London Business News | Londonlovesbusiness.com

Startups must prioritize security to protect against potential threats, utilizing safes, backups, and digital protection services.

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach - DevOps.com

SquareX exposes serious vulnerabilities in Chrome extensions, highlighting the need for enhanced monitoring to mitigate ongoing threats in browser security.

Five methods to safeguard your business - London Business News | Londonlovesbusiness.com

Startups must prioritize security to protect against potential threats, utilizing safes, backups, and digital protection services.
moredata-protection

How federal agencies can combat identity-related cyber threats and unmask cybercriminals

Agencies must adopt proactive and aggressive strategies to combat rising identity-related cyber threats, especially within government sectors.
Increased identity exposures and high password reuse rates among .gov emails pose significant security risks.

VyprVPN Review: Can It Still Perform This Year and Beyond?

VyprVPN provides robust online security with a strong no-logs policy and top-notch encryption.

Passkey technology is elegant, but it's most definitely not usable security

Passkeys offer a promising alternative to traditional passwords, but usability challenges hinder their effectiveness and widespread adoption.
[ Load more ]