updated)
-
The Federal Trade Commission has added increased restrictions in the updated Children’s Online Privacy Protection Act regulation, which will be effective beginning June 23, according to The Record, a news site by cybersecurity firm Recorded Future.
-
Critics — which include the US embassy in Zambia — contend the just-signed Cyber Security Act and the Cyber Crime Act allow suppression of dissent and too much concentration of power.
-
Malicious payloads have been distributed as part of a new covert multi-stage intrusion while Chinese advanced persistent threat operation IronHusky has been targeting Russian and Mongolian government entities with an upgraded MysterySnail RAT variant, reports The Hacker News.
-
Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware Scan Interface (AMSI) capabilities. This measure, aimed at countering sophisticated attack vectors, represents a crucial step to safeguard on-premises infrastructure that serves as the backbone of many organizations worldwide. Why AMSI Integration Matters Exchange and SharePoint Servers are critical assets for…
-
A cyberespionage group of Russian origin that has targeted entities from Ukraine, or from countries that are helping Ukraine, has recently launched an attack against the military of a Western nation using an updated version of the GammaSteel malware. Shuckworm, also known as Gamaredon, Aqua Blizzard, or Primitive Bear, is an APT group that is…
-
A sophisticated ransomware strain known as Hellcat has emerged as a formidable threat in the cybersecurity landscape since its first appearance in mid-2024. The malware has rapidly evolved its capabilities, specifically targeting critical sectors including government agencies, educational institutions, and energy infrastructure. This group doesn’t merely encrypt data; they weaponize psychological tactics and exploit previously…
-
We’ve been offering our Security Onion documentation in book form on Amazon for a few years and it’s now been updated for the recently released Security Onion 2.4.140!Thanks to Richard Bejtlich for writing the inspiring foreword!Proceeds go to the Rural Technology Fund!This edition has been updated for Security Onion 2.4.140 and includes a 20% discount…
-
Most severe of the newly added flaws is the Edimax IC-7100 IP camera OS command injection vulnerability, tracked as CVE-2025-1316.
-
Most severe of the newly added flaws is the Edimax IC-7100 IP camera OS command injection vulnerability, tracked as CVE-2025-1316.
-
Most severe of the newly added flaws is the Edimax IC-7100 IP camera OS command injection vulnerability, tracked as CVE-2025-1316.
-
We’ve been offering our Security Onion documentation in book form on Amazon for a few years and it’s now been updated for the recently released Security Onion 2.4.130!Thanks to Richard Bejtlich for writing the inspiring foreword!Proceeds go to the Rural Technology Fund!This edition has been updated for Security Onion 2.4.130 and includes a 20% discount…
-
Smart Secret Scanning: Decoding the Intelligence Behind Cybersecurity Have you ever wondered how some organizations manage to preserve their digital data integrity amidst in technology? It may seem like a mountainous task, but the secrets lie in smart secret scanning and cybersecurity innovations. Let’s unpack the Non-Human Identities (NHIs) and the management of their secrets.…
-
New submitter SharkByte writes: Mozilla just updated its Terms of Use and Privacy Policy for Firefox with a very disturbing “You Give Mozilla Certain Rights and Permissions” clause: When you upload or input information through Firefox, you hereby grant us a nonexclusive, royalty-free, worldwide license to use that information to help you navigate, experience, and…
-
We’ve been offering our Security Onion documentation in book form on Amazon for a few years and it’s now been updated for the recently released Security Onion 2.4.120!Thanks to Richard Bejtlich for writing the inspiring foreword!Proceeds go to the Rural Technology Fund!This edition has been updated for Security Onion 2.4.110 and includes a 20% discount…
-
Attacks with the new Coyote trojan variant over the past month involved the deployment of an LNK file executing a PowerShell command facilitating next-stage PowerShell script retrieval for the eventual launching of the trojan, which not only obtained system details and an antivirus product list but also sought to bypass sandbox discovery, according to a…
-
Attacks with the new Coyote trojan variant over the past month involved the deployment of an LNK file executing a PowerShell command facilitating next-stage PowerShell script retrieval for the eventual launching of the trojan, which not only obtained system details and an antivirus product list but also sought to bypass sandbox discovery, according to a…
-
The International Society of Automation (ISA) announced this week release of ANSI/ISA-62443-2-1-2024, an update to industrial automation and control systems (IACS) security standards. Titled Part 2-1: Security Program Requirements for IACS Asset Owners, the document defines the essential policies and procedures asset owners must implement to secure IACS during operation. Aligned with the comprehensive definition…
-
On January 28, the Bulletin of the Atomic Scientists updated the Doomsday Clock from 90 to 89 seconds until “midnight,” as world-ending threats continue escalating at a terrifying pace. Bulletin scientists listed several conditions that influenced the clock update.Read Entire Article
-
Attackers who infiltrated Change Healthcare using unsecured account credentials were not only able to exfiltrate individuals’ names, birthdates, home and email addresses, Social Security numbers, and other government IDs but also their health insurance details, diagnoses, test and imaging results, treatment plans, and banking details.