THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)
Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break...
Stealer here, stealer there, stealers everywhere!
Introduction Information stealers, which are used to collect credentials to then sell them on the dark web or...
Buyer’s guide: Edge data centers
Edge data centers include hardware, software, applications, data management, connectivity, gateways, security, and advanced analytics. They come in...
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers
Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be...
TikTok owner sacks intern for sabotaging AI project
Chinese technology giant ByteDance denied reports that the incident caused more than $10m of damage. Source:: BBC News...
Severe flaws in E2EE cloud storage platforms used by millions
Several end-to-end encrypted (E2EE) cloud storage platforms are vulnerable to a set of security issues that could expose...
Internet Archive breached again through stolen access tokens
The Internet Archive was breached again, this time on their Zendesk email support platform after repeated warnings that...
Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail...
Microsoft creates fake Azure tenants to pull phishers into honeypots
Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and...
Google Scholar has a ‘verified email’ for Sir Isaac Newton
It’s true: Google Scholar profile of the renowned former physicist and polymath, Sir Isaac Newton bears a “verified email”...
Acronym Overdose – Navigating the Complex Data Security Landscape
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and...
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting...
US probing Elon Musk’s Tesla over self-driving systems
The National Highway Traffic Safety Administration’s evaluation is the first step toward a potential recall of 2.4 million...
Cisco takes DevHub portal offline after hacker publishes stolen data
Cisco confirmed today that it took its public DevHub portal offline after a threat actor leaked “non-public” data,...
Product Recall: AGUG Inflatable Swim Vest sold via Amazon (2402-0272)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Recall: April HP Full-Body Rock Climbing Harness sold via Amazon (2410-0030)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Recall: Martindale/Drummond Test Lamp MTL10/15/20/20B Mk3 (2410-0004)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
ESET partner breached to send data wipers to Israeli orgs
Hackers breached ESET’s exclusive partner in Israel to send phishing emails to Israeli businesses that pushed data wipers...
AWS Data Exchange now provides APIs for data grants, enabling programmatic data sharing
Today, AWS announces the availability of APIs for data grants in AWS Data Exchange, a set of common...
Amazon Bedrock Model Evaluation now supports evaluating custom model import models
Model Evaluation on Amazon Bedrock allows you to evaluate, compare, and select the best foundation models for your...