-
Sirius XM Software Vulnerability
PRIVACY PRIVACY This is new: Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed security bug that would have allowed a savvy hacker to hijack vehicles and steal user data. According to researchers, the bug was in the car’s Sirius XM…
-
Researchers found security pitfalls in IBM’s cloud infrastructure
PRIVACY PRIVACY Security researchers recently probed IBM Cloud’s database-as-a-service infrastructure and found several security issues that granted them access to the internal server used to build database images for customer deployments. The demonstrated attack highlights some common security oversights that can lead to supply chain compromises in cloud infrastructure. Developed by researchers from security firm…
-
Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
PRIVACY PRIVACY The way build artifacts are stored by the GitHub Actions platform could enable attackers to inject malicious code into software projects with CI/CD (continuous integration and continuous delivery) workflows that don’t perform sufficient filtering when downloading artifacts. Cybersecurity researchers have identified several popular artifacts download scripts used by thousands of repositories that are…
-
Unwrapping Some of the Holiday Season’s Biggest Scams
PRIVACY PRIVACY Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their nastiest cons as people travel, donate to charities, and simply try to enjoy their time with friends and family. Unfortunate as it is, scammers see this time of year as a tremendous opportunity…
-
UK Extends NIS Regulations to IT Managed Service Providers
PRIVACY PRIVACY The UK strengthens its regulations on Network and Information Systems (NIS) to better prevent software supply chain attacks Read More
-
Eight Charged with $30m Unemployment Benefits Fraud
PRIVACY PRIVACY Defendants allegedly used insider to obtain personal information Read More
-
Researchers Accidentally Crash Cryptomining Botnet
PRIVACY PRIVACY Akamai reveals how a simple syntax error stopped it sending commands Read More
-
8 things to consider amid cybersecurity vendor layoffs
PRIVACY PRIVACY 2022 has been a heavy year for layoffs in the technology sector. Whether due to budget restraints, mergers and acquisitions, streamlining, or economic reasons, TrueUp’s tech layoff tracker has recorded over 1000 rounds of layoffs at tech companies globally so far, affecting more than 182,000 people. Some of the biggest tech companies in…
-
LastPass Reveals Another Customer Data Breach
PRIVACY PRIVACY Incident is second this year, although company says passwords are safe Read More
-
Test post delete – 1-12-2022
PRIVACY PRIVACY Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Lorem ipsum dolor sit amet.. Sending out The Network password ~!@#$%^&*()_+{}|:”<>?[];’,./ The post Test post delete – 1-12-2022 appeared first on…