Sat.Sep 21, 2024

article thumbnail

Ukraine Bans Telegram Use for Government and Military Personnel

The Hacker News

Ukraine has restricted the use of the Telegram messaging app by government officials, military personnel, and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Coordination Centre for Cybersecurity (NCCC) in a post shared on Facebook.

article thumbnail

Hackers stole over $44 million from Asian crypto platform BingX

Security Affairs

Cybercriminals stole more than $44 million worth of cryptocurrency from the Singaporean crypto platform BingX. Singaporean crypto platform BingX reported a cyberattack on Friday. Threat actors stole over $44 million worth of cryptocurrency. The crypto platform discovered unauthorized transfers of funds on Thursday night, shortly before BingX announced a shutdown for “wallet maintenance” on social media. [ Temporary Wallet Maintenance Notice] ■ Schedule: ~24 hours ■ When maintenance i

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

The Hacker News

A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian targets. "Rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims' data and then destroy their infrastructure with a wiper to prevent recovery," Kaspersky said in a Friday analysis.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Understanding and adhering to cybersecurity regulations is crucial for any organization as cyber threats evolve and become more sophisticated. The landscape of cybersecurity laws and regulations today is set to undergo significant changes, impacting businesses, government entities, and individuals alike. Let’s explore what to expect from the upcoming regulations, provide insights into critical federal and state laws, and offer practical compliance and risk management strategies.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

7 reasons why I choose Android over iOS (and sideloading is not one of them)

Zero Day

Many years ago, I decided Android was the mobile operating system for me. But what is it about Google's OS that I find more appealing than Apple's?

Mobile 91
article thumbnail

LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO

The Hacker News

The U.K. Information Commissioner's Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users' data in the country to train its artificial intelligence (AI) models. "We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K.

More Trending

article thumbnail

How Apple, Google, and Microsoft can save us from AI deepfakes

Zero Day

To combat AI-driven disinformation, tech giants must collaborate to adopt these open standards. The absence of Apple and X raises concerns.

77
article thumbnail

Interactive PDF Analysis: An Open Source Forensic Tool for Threat Detection

Penetration Testing

PDF files are a staple in today’s digital world, used for everything from business documents to user manuals. However, like any widely adopted format, PDFs can be exploited to carry... The post Interactive PDF Analysis: An Open Source Forensic Tool for Threat Detection appeared first on Cybersecurity News.

article thumbnail

USENIX NSDI ’24 – Autothrottle: A Practical Bi-Level Approach to Resource Management for SLO-Targeted Microservices

Security Boulevard

Authors/Presenters:Zibo Wang, Pinghe Li, Chieh-Jan Mike Liang, Feng Wu, Francis Y. Yan Awarded Outstanding Paper! Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

62
article thumbnail

Beware of Fake Downloads: AsyncRAT Spreads via Popular Software Cracks

Penetration Testing

In an alarming trend observed by McAfee Labs, cybercriminals have refined their tactics, luring unsuspecting users into downloading AsyncRAT malware disguised as popular cracked software. This evolving menace leverages the... The post Beware of Fake Downloads: AsyncRAT Spreads via Popular Software Cracks appeared first on Cybersecurity News.

article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

I bought the iPhone 16 Pro for just one reason - and AI's got nothing to do with it

Zero Day

If you're also an avid photographer but don't want to carry your digital camera everywhere, upgrading this year might be wise.

61
article thumbnail

ZeroLogon to NoPac Vulnerability: Black Basta Group’s Exploit Arsenal Revealed

Penetration Testing

Qualys has released a comprehensive report shedding light on the Black Basta ransomware, a highly disruptive threat that has wreaked havoc across industries since its emergence in April 2022. Operating... The post ZeroLogon to NoPac Vulnerability: Black Basta Group’s Exploit Arsenal Revealed appeared first on Cybersecurity News.

article thumbnail

Upgrade to Windows 11 Pro for $20 right now - here's how

Zero Day

Save 89% on a Windows 11 Pro license for more productivity features to help you get things done.

65
article thumbnail

Weekly Update 418

Troy Hunt

Just watching back through bits of this week's video, the thing that's really getting at me is the same thing I've come back to in so many past videos: lack of organisational disclosure after a breach. Lack of disclosure to impacted customers, lack of disclosure to the public, and a general apathy towards the transparency with which we expect organisations to behave post-breach.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Learn a new language with 74% off a Babbel subscription right now

Zero Day

Save $449 on a Babbel Language Learning subscription and learn 14 new languages with this deal.

52
article thumbnail

Profiling the Gaza Hackers Team

Security Boulevard

In the following post I'll profile the Gaza Hackers Team. Sample photos: Primary group's domains: hxxp://gaza-hacker.com hxxp://hacker.ps hxxp://gaza-hacker.net hxxp://gaza-hack.org hxxp://gaza-hack.info hxxp://xhackerx.com hxxp://gaza-hack.com hxxp://gaza-hackers.com Primary group's email address accounts: moayy2ad@hotmail.com c-e@hotmail.com le0n005061@gmail.com Related domain names registered using the same email address accounts: hxxp://frontat.com hxxp://nswaa.com hxxp://elsahefa.com hxxp:/

article thumbnail

Iranian Hackers Tried to Give Hacked Trump Campaign Emails to Dems

WIRED Threat Level

Plus: The FBI dismantles the largest-ever China-backed botnet, the DOJ charges two men with a $243 million crypto theft, Apple’s MacOS Sequoia breaks cybersecurity tools, and more.

Hacking 75