Remember when hackers used to write their own malware? Kids these days don’t want to work, they just want freely available tools to do it for them.
Centralized Cyber-Incident Reporting Can Improve Effectiveness
Companies need robust cyber-response plans and a straightforward path to transparency.
В Cacti устранены уязвимости, обнаруженные Positive Technologies
Специалист Positive Technologies Алексей Соловьев обнаружил несколько уязвимости в системе мониторинга Cacti. Эксплуатация этих багов могла позволить атакующему выполнить произвольный код на сервере….
Малварь ViperSoftX маскируется под электронные книги на торрент-трекерах
Эксперты Trellix обнаружили новую версию вредоносного ПО ViperSoftX, которое распространяется под видом электронных книг через торрент-трекеры и использует Common Language Runtime (CLR) для динамической загрузки и выполнения команд PowerShell….
Microsoft’s Partnership With Middle East AI Firm Under Scrutiny
The US government worries that Group 42 Holdings, an AI firm based in the United Arab Emirates, could become a backdoor for technology leaks to China.
Fujitsu Suffers Worm-Like Attack From Something That Wasn’t Ransomware
The CE giant released its investigative findings regarding a March cyberattack that resulted in data exfiltration affecting its Japanese operations.
Gen Launches Scam Artists to Highlight Emotional Toll of Cybercrime Through Creative Artwork
Saviynt Expands Capabilities With EY Alliance, Elevating Approach to External User Management With its Identity Cloud
Peloton Takes a Spin Through Court, Thanks to AI Privacy Lawsuit
The case alleges a third-party marketer for the exercise giant improperly used customer chat data to train its AI models.
Attackers Have Been Leveraging Microsoft Zero-Day for 18 Months
Likely two separate threat actors are using the just-patched CVE-2024-38112 in targeted, concurrent infostealer campaigns.