from
-
Get stories like these delivered straight to your inbox. Sign up for The 74 Newsletter
-
A man from New York City has admitted to computer hacking and associated crimes after being caught with a laptop containing hundreds of thousands of stolen payment card details.
-
The transition to electric vehicles (EVs) is rapidly gaining momentum, but the recent Pwn2Own Automotive 2024 competition in Tokyo has revealed a concerning vulnerability: EV chargers themselves can be hacked. Researchers from Computest’s Sector 7 team demonstrated how they could remotely gain full control of an Autel MaxiCharger, opening the door to a variety of…
-
Microsoft says this month’s Patch Tuesday cumulative updates also fix a known issue causing Windows Server 2019 boot problems, freezes, and performance issues after installing the August 2024 security updates.
-
Supply chain attacks represent a growing and increasingly sophisticated threat.
-
A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating sensitive information by taking advantage of the noise generated by the pixels on the screen.
-
Third-party risk management is a significant CISO challenge with deep business consequences. When a key third-party supplier succumbs to cyberattack, operations can grind to a halt.
-
The global healthcare system has become increasingly integrated with third-party medical suppliers in recent years. These suppliers are vital in providing essential services, medical equipment, pharmaceuticals, and digital tools that healthcare organizations depend on to operate efficiently.
-
Wing Security has released SaaS Pulse, a free tool for SaaS security management, offering organizations actionable insights and continuous oversight into their SaaS security posture. This free tool continuously monitors threats from issues like critical misconfigurations, offboarding errors, user access risks, and more.
-
Risk management is essential, but it shouldn’t stifle innovation. I learned early on in my career, especially as I delved into innovation, that risk is something to be managed, but it shouldn’t lead anything. You need to be able to apply risk as a treatment, or a layer or a lens to what you’re doing.…
-
MalBot September 10, 2024, 12:50am 1 Spotify and Apple Music among defrauded services using a combination of AI tools and bots.
-
Last updated at Mon, 09 Sep 2024 13:00:00 GMT As ransomware threats continue to evolve, security and risk management leaders must stay ahead by adopting comprehensive strategies to protect their organizations. The 2024 Gartner report, “How to Prepare for Ransomware Attacks”, provides critical insights into the latest tactics used by bad actors and offers practical…
-
Sep 09, 2024The Hacker NewsData Security / GenAI Security
-
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) published a Request for Information (RFI) for commercial port operators to advance the work of the Directorate’s Maritime Port Resiliency and Security Research Testbed project, which studies vulnerabilities in U.S. ports and the effectiveness of current protections and mitigations. Based on the information it…
-
LIANYUNGANG (China), Sept 9 — China will train thousands of law enforcement officers from different countries over the next 12 months, its police chief said Monday, as it seeks to cement its role as a global security provider.
-
In today’s digital era, protecting healthcare data from cyber attacks is more crucial than ever. The healthcare sector, rich with sensitive patient information and critical records, is a prime target for cybercriminals. Data breaches can have severe consequences, including financial losses, legal repercussions, and compromised patient care.
-
In brief: Security researchers discovered a particularly alarming form of malware that tricks users into downloading an infected app to propagate. While the attack vector is common, the insidious nature of the malicious code makes it unique. It targets and steals crypto wallet security codes using OCR to scan images for mnemonic passphrases.
-
The weather starts getting colder, days get darker and new home security owners begin to wonder, “My security camera will be all right in the rain and snow, right?”
-
reader comments 39