1
1

The PC Manager app has been kicking around the Microsoft Store since late 2022, but it's an optional download and not something that comes pre-installed with Windows 11. As such, it hasn't exactly been a mainstream hit – the app only has around 200 reviews as of writing. But as...Read Entire Article

2
1

A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.

3
1

We always think of [Scott Manley] as someone who knows a lot about rockets. So, if you think about it, it isn’t surprising he’s talking about GPS — after all, …read more

4
1

The American Radio Relay League (ARRL) warns it suffered a cyberattack, which disrupted its IT systems and online operations, including email and the Logbook of the World. [...]

5
1

The banking trojan "Grandoreiro" is spreading in a large-scale phishing campaign in over 60 countries, targeting customer accounts of roughly 1,500 banks. [...]

6
1

The U.S. Justice Department charged five individuals, including a U.S. woman, for aiding North Korea-linked IT workers to infiltrate 300 firms. The Justice Department unsealed charges against an Arizona woman, a Ukrainian man, and three unidentified foreign nationals accused of aiding overseas IT workers, pretending to be U.S. citizens, to infiltrate hundreds of firms in […]

7
1

Follow us down this deep rabbit hole of privacy policy after privacy policy Feature  In April, attorney Christine Dudley was listening to a book on her iPhone while playing a game on her Android tablet when she started to see in-game ads that reflected the audiobooks she recently checked out of the San Francisco Public Library.…

8
1

A ransomware operation targets Windows system administrators by taking out Google ads to promote fake download sites for Putty and WinSCP. [...]

9
1

Russia-linked Turla APT allegedly used two new backdoors, named Lunar malware and LunarMail, to target European government agencies. ESET researchers discovered two previously unknown backdoors named LunarWeb and LunarMail that were exploited to breach European ministry of foreign affairs. The two backdoors are designed to carry out a long-term compromise in the target network, data […]

10
1

Zeyi Yang / MIT Technology Review: Some researchers say GPT-4o's Chinese token-training data is polluted by spam and porn websites, likely due to inadequate data cleaning  —  Soon after OpenAI released GPT-4o on Monday, May 13, some Chinese speakers started to notice something seemed off about this newest version of the chatbot …

11
1

submitted by 0nekoneko7 to securitynews3 points | 0 commentshttps://thecyberexpress.com/replacement-of-sslvpn-and-webvpn/

12
1

It took two brothers who went to MIT months to plan how they were going to steal, launder and hide millions of dollars in cryptocurrency -- and only 12 seconds to actually pull off the heist. The post Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds appeared first on Security Boulevard.

13
1

Covered Financial Institutions Have 30 Days to Notify Customers of Data BreachesThe Securities and Exchange Commission unanimously approved updated regulations for covered financial institutions requiring entities such as fund companies and investment advisers to notify customers within 30 days of a cyber incident that compromised their data.

14
1

The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.

15
1

The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing the client management tool Quick Assist to target users in social engineering attacks. "Storm-1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware," the company said in a report published on May 15, 2024. The

16
1

Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a significant increase from 24% the year before, according to Check Point. This trend underscores the escalating risk landscape in cloud environments. The 2024 Cloud Security Report gathers insights from over 800 cloud and cybersecurity professionals. Cloud security incidents on the rise The latest survey from Check Point reveals a concerning trend: while most organizations continue … More → The post Cloud security incidents make organizations turn to AI-powered prevention appeared first on Help Net Security.

17
1

While the protocol has made passwordless authentication a reality, token-binding is key to prevent against token theft and reuse, security vendor says.

18
1

British personal computer maker Raspberry Pi has announced that it is considering a London initial public offering, a rare win for the exchange after a number of British firms chose to list in the US.

19
1

WPS Office is an office suite developed by Kingsoft that supports spreadsheets, presentations, documents, and others. It has been used by millions of users worldwide for multiple official purposes. However, WPS Office has been discovered with a critical vulnerability which is associated with Path Traversal. This vulnerability has been assigned to CVE-2024-35205, and the severity […] The post WPS Office For Android Vulnerability Puts Over 500 Million+ Users At Risk appeared first on Cyber Security News.

20
1

Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zero-days which have been actively exploited in the wild. Of the 61 flaws, one is rated Critical, 59 are rated Important, and one is rated Moderate in severity. This is in addition to 30 vulnerabilities&

21
1

James Reddick / The Record: Research: Southeast Asian scam syndicates, which typically use forced labor to run online scams like pig butchering, are stealing an estimated $64B annually  —  Online fraud operations in Southeast Asia continue to grow, with organized scamming syndicates netting an estimated $64 billion each year worldwide, according to new research.

22
1

According to the MITRE ATT&CK framework, lateral movement consists of techniques that threat actors use to enter and control remote systems on a network. In Amazon Web Services (AWS) environments, threat actors equipped with illegitimately obtained credentials could potentially use APIs to interact with infrastructures and services directly, and they might even be able to use […]

23
1

In this article, you will find excerpts from various reports that offer statistics and insights about the current ransomware landscape. Global ransomware crisis worsens NTT Security Holdings | 2024 Global Threat Intelligence Report | May 2024 Ransomware and extortion incidents surged by 67% in 2023 Manufacturing topped the list of attack sectors in 2023 at 25.66% and had the most ransomware victims posted on social channels with 27.75%. Ransomware attacks impact 20% of sensitive data … More → The post Ransomware statistics that reveal alarming rate of cyber extortion appeared first on Help Net Security.

24
1

A cybercriminal using the name "salfetka" claims to be selling the source code of INC Ransom, a ransomware-as-a-service (RaaS) operation launched in August 2023. [...]

25
1

Ransomware groups have always created problems for their victims that only they could solve. Black Basta is taking that core idea in a creative, new direction.

view more: next ›

Pulse of Truth

198 readers
0 users here now

Cyber Security news and links to interesting things. This community is mostly fed by an instance of Dittybopper.

founded 7 months ago
MODERATORS