(Bloomberg) — The Kremlin raised the possibility of changing Russia’s Constitution after a top lawmaker proposed bolstering parliament’s powers, in a move that could help to extend President Vladimir Putin’s rule.
(Bloomberg) — The U.K.’s House of Lords backed a move designed to make a no-deal Brexit more difficult by stopping the next prime minister from closing down Parliament. The plan won’t become law until it has also been passed by members of Parliament in the Commons, where it is likely to face stronger opposition from pro-Brexit politicians.
(Bloomberg) — State-backed hackers have attempted to infiltrate targets related to U.S. elections more than 700 times in the past year, furthering concerns about potential meddling in upcoming races, according to a blog posted Wednesday by Microsoft Corp.
vicious…F-word” against him, alleging, “that’s not somebody that loves our country.”” data-reactid=”16″>At an arena rally in Greenville, North Carolina, on Wednesday evening, President Donald Trump quadrupled down on his recent racist attacks on four female Democratic lawmakers. He also chastised one of them for using “the big, fat, vicious…F-word” against him, alleging, “that’s not somebody that loves our country.”
Written by Shannon Vavra
Microsoft has notified 10,000 customers in the past year that they have been the brunt of nation-state cyberattacks — some of which were successful — from Iran, North Korea, and Russia, Microsoft announced Wednesday.
It’s that time of year – Black Hat USA, now in its 22nd year! Recognized as the world’s leading information security event, the Verodin team is excited for the conference, which promises to provide opportunities to collaborate and share insights in cybersecurity research, development and trends.
Microsoft said it has notified close to 10,000 people in the past year that they have been targeted by state-sponsored hackers.
Written by Sean Lyngaas
When researchers first found critical vulnerabilities in the firmware of Lenovo computer servers, it looked like a fairly straightforward issue. The problem, however, involved far more than the Hong Kong-based PC giant.
Written by Jeff Stone
Bulgarian authorities have arrested a 20-year-old government contractor in connection with a hack on the country’s national tax agency that involved information about roughly 5 million adults, prosecutors said Wednesday.
The role of AI in cyber security and how it’s reinventing cyber security
and cybercrime alike
Artificial intelligence poses both a blessing and a curse to
businesses, customers, and cybercriminals alike.
A man walks into a doctor’s office for a CT scan of his gallbladder. The gallbladder is fine but the doctor notices a saclike pocket of fluid on the man’s pancreas. It’s a cyst that may lead to cancer, the doctor tells him, so I’ll need to cut it out to be safe.
In the last few years, we’ve seen digital transformation take over the mindset of businesses and there has been a huge push to ensure that organizations in all sectors are adopting technology that is at the forefront of innovation. Every sector from marketing to manufacturing now has some aspect of digitalization and we’re seeing everything from AI to quantum computing being embraced to leverage greater efficiency, service and profitability.
For years, the “right to repair” movement struggled to gain widespread public attention. But that’s started to change as consumers, activists, and even Presidential candidates have highlighted how arbitrary tech repair restrictions are driving up costs, eroding consumer rights, and creating a mountain of unnecessary electronic waste.
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Written by Shannon Vavra
When U.S. Cyber Command simulated a cyberattack against a seaport last month, military personnel hunted for adversaries who appeared to be using malware against a critical trade hub.
Facebook is leaning on fears of China exporting its authoritarian social values to counter arguments that it should be broken up or slowed down. Its top executives have each claimed that if the U.S. limits its size, blocks its acquisitions or bans its cryptocurrency, Chinese company’s absent these restrictions will win abroad, bringing more power and data to their government. CEO Mark Zuckerberg, COO Sheryl Sandberg and VP of communications Nick Clegg have all expressed this position.
Written by Sean Lyngaas
Rather than expend resources on creating fancy new tools, malicious hackers often do the bare minimum needed to breach their targets. That means that when researchers expose their malware, the groups tend to only slightly modify their code to keep it effective.
It has been reported that American telecommunications provider Sprint has suffered a data breach, telling customers that hackers broke into their accounts through a Samsung website. The number of customer accounts breached isn’t yet known. The hack occurred June 22, Sprint told its customers in a letter, and included details like first and last name, billing address, phone number, subscriber ID, account number, device type, device ID, monthly charges, account creation date, upgrade eligibility and any add-on services. It occurred via the Samsung “add a line” website.
By The Recorded Future Team on July 17, 2019
This is the third blog in a three-part series where we examine how security teams manage their security incident response processes. In the first blog, we highlighted the challenges faced when trying to mitigate security incidents and how constraints force many teams into taking a reactive approach. In the second blog, we explained how threat intelligence minimizes reactivity and helps incident response teams take a more proactive approach to mitigating vulnerabilities and defending against cyber threats. In this blog, we examine some real-world use cases that demonstrate the value of threat intelligence for incident response teams and how to avoid threat intelligence “abuse.”
Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems.