US Government Warns Healthcare is Biggest Target for BlackCat Affiliates
The US government advisory warns healthcare organizations are being targeted by BlackCat amid an ongoing cyber-incident affecting Change Healthcare Read More
How the “Frontier” Became the Slogan of Uncontrolled AI
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration will drive the next era of growth,...
dav1d-1.4.0-1.fc40
FEDORA-2024-12fcc689ac Packages in this update: dav1d-1.4.0-1.fc40 Update description: Update to version 1.4.0. This version addresses CVE-2024-1580 (see RHBZ#2264939). Read More
TimbreStealer Malware Targets Mexican Victims with Tax-Related Lures
The maker of the Mispadu Trojan started distributing a new infostealer with financial lures to Mexican users, Cisco Talos found Read More
AI governance and preserving privacy
AT&T Cybersecurity featured a dynamic cyber mashup panel with Akamai, Palo Alto Networks, SentinelOne, and the Cloud Security Alliance. We discussed some provocative topics around...
Biden Bans Mass Sale of Data to Hostile Nations
A new presidential executive order attempts to prevent the mass sales of personal data to countries like China and Russia Read More
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding of their tactics and tools....
Smashing Security podcast #361: Wireless charging woe, AI romance apps, and ransomware revisited
Your smartphone may be toast – if you use a hacked wireless charger, we take a closer look at the latest developments in the unfolding...
How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise
Graham Cluley Security News is sponsored this week by the folks at Cynet. Thanks to the great team there for their support! Thorough, independent tests...
USN-6648-2: Linux kernel (Azure) vulnerabilities
It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker...