Items tagged with cybersecurity

Gamers likely recall back in January when a serious remote code execution (RCE) security exploit was revealed in the game Dark Souls III. This bug allowed malicious players to run arbitrary code on other players in the same session, which is particularly galling considering the way Dark Souls allows players to... Read more...
With cybersecurity being highly important in our present digital age, cybersecurity services have the potential to be a big money maker. Google appears to have recognized this potential with its most recent acquisition announcement. Google intends to buy Mandiant, having signed a definitive agreement of acquisition... Read more...
News broke on February 25th that NVIDIA had been hit by a cyber-attack. The LAPSUS$ ransomware gang took responsibility for the attack the next day, but also claimed that NVIDIA hit them back with its own ransomware. However, NVIDIA’s counterstrike seems not to have disabled LAPSUS$ access to the data it stole nor has... Read more...
On Wednesday, February 23rd, Russia announced its invasion of Ukraine through a "special military operation." Since then, fighting has continued in Ukraine, and amidst the turmoil, hacking groups in the region and around the world have taken sides, threatening cyberwar against Russia, Ukraine, or the United... Read more...
Just yesterday, we reported on The Telegraph's report claiming that NVIDIA had suffered a cyber-attack. NVIDIA didn't provide any details, but the company's statement that it was "investigating an incident" was admission enough. As it stood last night, it seemed clear something had happened, but we didn't know... Read more...
As you may have heard, NVIDIA is kind of a big deal these days. Like, "bigger than Facebook" big. Mean Green's expertise in providing machine learning accelerators for hyperscalers, the enterprise and high-performance computing markets (as well as GPUs for gamers of course) has brought them powerful profits. This fame and fortune, unfortunately, Read more...
This week, the Cybersecurity and Infrastructure Security Agency (CISA) published a “Free Cybersecurity Services and Tools” webpage outlining what can be done for security incidents, intrusions, preparation, and resilience against cyberattacks. This is intended to be a “one-stop resource where organizations of all... Read more...
It seems that cybersecurity concerns are once again on the rise, as just this week, we reported on the surge in ransomware attacks. Now, researchers at Qualys have published a privilege escalation vulnerability within snap-confine, a software packaging, and deployment system for Linux Kernel-based operating systems... Read more...
HP, which maintains a threat analyst team, has released a post on its threat research blog detailing a tricky new malware campaign. Only a day after Microsoft announced that Windows 11 was entering its final phase of availability, becoming available for broad deployment on eligible devices, HP discovered that someone... Read more...
ExpressVPN runs a bug bounty program through Bugcrowd for the purpose of improving security across the VPN company’s services and websites. The program has already had 22 successful bounty claimants, but ExpressVPN is now sweetening the pot in order to attract more white hat hackers. ExpressVPN’s bounty program has... Read more...
Back in May of last year, we reported on a new campaign by Google to increase user account security through a number of methods. As part of this campaign, Google announced its plans to drive people to use two-factor authentication (2FA), saying that users whose accounts are appropriately configured would begin to be... Read more...
We reported a week ago on a security vulnerability in Windows that multiple publicly available exploits can leverage to gain elevated privileges. We advised readers to apply the patch for this vulnerability as soon as possible, and now the Cybersecurity and Infrastructure Security Agency (CISA) is ordering federal... Read more...
A cybersecurity firm just recently discovered a search engine optimization (SEO) poisoning campaign intended to dupe users into installing malware on their computers. The campaign works by leveraging various SEO techniques, such as cramming tons of keywords into the source code of various malicious webpages, in order... Read more...
It felt like we were constantly reading about data compromises last year. Unfortunately, this statement is not far from the truth. According to the Identity Theft Resource Center (ITRC), there were 1,862 data compromises in 2021. The overall number of data compromises was up by 63% from 2020 and the number of... Read more...
This week, a security vulnerability in Dark Souls 3 was discovered, allowing remote code execution (RCE) and any threat actor to wreak havoc on your PC. As this vulnerability only affects players who play online, potentially across the Dark Souls series, servers have been switched offline, and it seems Dark Souls... Read more...
When people think of malware and malicious code, they might imagine an infected file or download from a sketchy email or website on their computer. However, this sort of infection is realistically only the tip of the iceberg and often some of the least sophisticated. Researchers at Kaspersky have found a complex... Read more...
There’s a new White Rabbit on the loose. While it does involve hackers, it’s got nothing to do with Neo. Instead, it’s yet another new ransomware family that recently appeared, targeting financial institutions. Possibly a side operation of the FIN8 hacking group, White Rabbit was recently used to attack a US bank... Read more...
It is a good idea to always be wary of packages, especially if you are not expecting one. The United States Federal Bureau of Investigation (FBI) recently warned American companies that cybercriminals are sending USB drives with ransomware in the mail. The cybercriminals have attempted to mimic legitimate institutions... Read more...
Google Docs pretty much revolutionized online collaboration when it came about. Instead of having to install clunky network software packages, or worse, use awkward remote desktop features, you could simply send your coworker or collaborator a web link and the two of you could work on a document simultaneously in your... Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a carrier—in this case, T-Mobile—to switch a customer’s number to an attacker-controlled... Read more...
Criminal ransomware distributors have evolved dramatically over the past few years. Operators that were once splinter groups or lone individuals have become highly sophisticated and organized. Security experts say it’s not getting any better, either. Rather, some say we’re in the “golden era of ransomware” and 2022... Read more...
In something that would seem straight out of a spy flick, Rostec, a Russian tech company has introduced a USB Flash drive that can destroy its NAND flash memory chips -- and hence the data stored on them -- using a built-in detonator. Technodynamika, which apparently falls under the umbrella of Rostec, are the ones... Read more...
First ... Prev 2 3 4 5 6 Next