Blog

Protecting AWS environments from cyberthreats

The shared responsibility model: why securing AWS workloads is essential Partner Content  Organizations are increasingly shifting their deployments to the cloud due to its many benefits over traditional on-premises solutions.…

Security pros more confident about fending off ransomware, despite being battered by attacks

Data leak, shmata leak. It will all work out, right? IT and security pros say they are more confident in their ability to manage ransomware attacks after nearly nine in ten (88 percent) were forced to contain efforts by criminals to breach their defenses in the past year.…

Apple plugs security hole in its iThings that’s already been exploited in iOS

Cupertino kicks off the year with a zero-day Apple has plugged a security hole in the software at the heart of its iPhones, iPads, Vision Pro goggles, Apple TVs and macOS Sequoia Macs, warning some miscreants have already exploited the bug.…

US freezes foreign aid, halting cybersecurity defense and policy funds for allies

Uncle Sam will 'no longer blindly dole out money,' State Dept says US Secretary of State Marco Rubio has frozen nearly all foreign aid cash for a full-on government review, including funds to defend America's allies from cyberattacks as well as steer international computer security policies.…

DeepSeek suspends new registrations amid cyberattack

Chinese AI startup grapples with consequences of sudden popularity China's DeepSeek, which shook up US AI companies with the debut of its R1 model family, has limited new signups due to ongoing cyberattack.…

Google takes action after coder reports ‘most sophisticated attack I’ve ever seen’

Latest trope is tricky enough to fool even the technical crowd… almost Google says it's now hardening defenses against a sophisticated account takeover scam documented by a programmer last week.…

Sweden seizes cargo ship after another undersea cable hit in suspected sabotage

NATO increasing patrols in the Baltic as region awaits navy drones Swedish authorities have "seized" a vessel – believed to be the cargo ship Vezhen – "suspected of carrying out sabotage" after a cable running between Sweden and Latvia in the Baltic Sea was damaged on the morning of…

CDNs: Great for speeding up the internet, bad for location privacy

Also, Subaru web portal spills user deets, Tornado Cash sanctions overturned, a Stark ransomware attack, and more Infosec in brief  Using a custom-built tool, a 15-year-old hacker exploited Cloudflare's content delivery network to approximate the locations of users of apps like Signal, Discord, and others.…

British Museum says ex-contractor ‘shut down’ IT systems, wreaked havoc

Former freelancer cuffed a week after being dismissed by UK's top visitor attraction The British Museum was forced to temporarily close some galleries and exhibitions this weekend after a disgruntled former tech contractor went rogue and shuttered some onsite IT systems.…

Someone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet

Who could be so interested in chips, manufacturing, and more, in the US, UK, Europe, Russia... Someone has been quietly backdooring selected Juniper routers around the world in key sectors including semiconductor, energy, and manufacturing, since at least mid-2023.…

Copyright © 2024 Lugapel