RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors
A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery...
ONE MONTH AWAY! Deadline Approaching for Funding Opportunity
CYBERSECURITY EDUCATION AND WORKFORCE DEVELOPMENT FUNDING OPPORTUNITY Last month, NICE announced a new Notice of Funding Opportunity (NOFO)...
New NIST Licensing Opportunity Teems with Potential Applications
Max Planck, one of the Twentieth Century’s most eminent physicists, observed, “An experiment is a question that science...
Ray Kammer, Who Led NIST to the Start of the 21st Century, Dies at 76
Kammer led a successful push to modernize the agency’s laboratory facilities. Source:: NIST
Secrets, Secrets Are No Fun. Secrets, Secrets (Stored in Plain Text Files) Hurt Someone
Secrets are meant to be hidden or, at the very least, only known to a specific and limited...
Email crypto phishing scams: stealing from hot and cold crypto wallets
The higher the global popularity of cryptocurrencies and the more new ways of storing them, the wider the...
Apple’s Vision Pro: Will it work for work?
At the launch of its Vision Pro headset in June, Apple offered up a variety of consumer entertainment...
Node.js Users Beware: Manifest Confusion Attack Opens Door to Malware
The npm registry for the Node.js JavaScript runtime environment is susceptible to what’s called a manifest confusion attack that could...
Instagram’s Twitter Alternative ‘Threads’ Launch Halted in Europe Over Privacy Concerns
Instagram Threads, the upcoming Twitter competitor from Meta, will not be launched in the European Union due to...
US officials ordered to limit contact with social media firms
A judge bars officials from contacting platforms over “content containing protected free speech”. Source:: BBC News – Technology
E2E encryption: Should big tech be able to read people’s messages?
Who will win in the years-long stalemate between governments and big tech around super-secure messaging? Source:: BBC News...
What is end to end encryption and why are police concerned about its rise?
WhatsApp, iMessage, Android Messages and Signal all use the super secure technology called end to end encryption. So...
Issue #584 (July 4, 2023)
#584 – JULY 4, 2023 Why Are Membership Tests So Fast for range() in Python? In Python, range()...
Swedish Data Protection Authority Warns Companies Against Google Analytics Use
The Swedish data protection watchdog has warned companies against using Google Analytics due to risks posed by U.S....
Microsoft set to face EU antitrust probe over Teams bundle: Report
The EU could open an antitrust investigation into Microsoft’s video and messaging platform Teams, stemming from a complaint...
DDoSia Attack Tool Evolves with Encryption, Targeting Multiple Sectors
The threat actors behind the DDoSia attack tool have come up with a new version that incorporates a new mechanism...
How to handle Windows 10 and 11 updates
Confused about how updates work in Windows 10 and Windows 11? Join the club. Over the years, Microsoft...
Mexico-Based Hacker Targets Global Banks with Android Malware
An e-crime actor of Mexican provenance has been linked to an Android mobile malware campaign targeting financial institutions...
China bans export of metals needed for semiconductors amid US-China chip war
China has fired the latest salvo in the ongoing electronic chip war with the US by restricting the...
Alert: 330,000 FortiGate Firewalls Still Unpatched to CVE-2023-27997 RCE Flaw
No less than 330000 FortiGate firewalls are still unpatched and vulnerable to CVE-2023-27997, a critical security flaw affecting...