News

  • Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited Flaws

    PRIVACY PRIVACY The newly added vulnerabilities span six years, with the oldest disclosed in 2016 Read More

    Read More

  • Manipulating Machine-Learning Systems through the Order of the Training Data

    PRIVACY PRIVACY Yet another adversarial ML attack: Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order. So what happens if the bad guys can cause the order to be not random?…

    Read More

  • Airline passengers left stranded after ransomware attack

    PRIVACY PRIVACY An Indian airline says that an “attempted ransomware attack” against its IT infrastructure caused flights to be delayed or canceled, and left passengers stranded. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Chaos ransomware explained: A rapidly evolving threat

    PRIVACY PRIVACY The Chaos ransomware builder started out last year as a buggy and unconvincing impersonation of the notorious Ryuk ransomware kit. It has since gone through active development and rapid improvements that have convinced different attacker groups to adopt it. The latest version, dubbed Yashma, was first observed in the wild in mid-May and…

    Read More

  • New Mend service auto-detects and fixes code, app security issues

    PRIVACY PRIVACY Open-source application security company Mend, formerly WhiteSource, has announced the launch of an automated remediation service for addressing code security issues. According to the firm, the new service is designed to reduce the software attack surface and application security burden, enabling developers to write secure code more easily. Mend has also integrated Mend…

    Read More

  • Messages Sent Through Zoom Can Expose People to Cyber-Attack

    PRIVACY PRIVACY Zoom has experienced several vulnerabilities in its software. Read More

    Read More

  • Seven Tips for Protecting Your Internet-Connected Healthcare Devices

    PRIVACY PRIVACY October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness. McAfee is pleased to announce that we’re a proud participant. Fitness trackers worn on the wrist, glucose monitors…

    Read More

  • UK Government Cybersecurity Advisory Board Applications Now Open

    PRIVACY PRIVACY Applications for joining the Government Cyber Security Advisory Board are now open. Read More

    Read More

  • GoodWill Ransomware Demands People Help the Most Vulnerable

    PRIVACY PRIVACY Ransomware detected in India is calling upon people to assist in feeding, clothing and making healthcare accessible to the poor. Read More

    Read More

  • Suspicious behavior: OTX Indicator of Compromise – Detection & response

    PRIVACY PRIVACY Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Extended Detection and Response customers. Executive summary AT&T Alien Labs does a tremendous job of developing and maintaining a database of observed Indicators of Compromise (IOC)…

    Read More

News, Advisories and much more

Exit mobile version