UNDER CONSTRUCTION!!!

Tech News

Keeping You Up To Date With The Latest Tech News & Virus Threats

Using the LockBit builder to generate targeted ransomware

ThepreviousKasperskyresearchfocusedonadetailedanalysisoftheLockBit3.0builderleakedin2022.Sincethen,attackershavebeenabletogeneratecustomizedversionsof...

Continue reading
  63 Hits

House Passes Reauthorization of Key US Surveillance Program After Days of Upheaval Over Changes

The bill was approved on a bipartisan basis, 273-147, though it will still have to clear the Senate to become law. The post House Passes Reauthorizati...

Continue reading
  80 Hits

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls

A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks. The post State-Sponsored Hackers...

Continue reading
  175 Hits

US-China Competition to Field Military Drone Swarms Could Fuel Global Arms Race

Military planners envision a scenario in which hundreds, even thousands of AI-powered machines engage in coordinated battle. The post US-China Competi...

Continue reading
  154 Hits

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized b...

Continue reading
  135 Hits

RubyCarp: Insights Into the Longevity of a Romanian Cybercriminal Gang

Operational for at least ten years, RubyCarp has its own botnet, its own tools, and its own community of users that concentrate on cryptomining and cr...

Continue reading
  89 Hits

Wiz Acquires Gem Security, Pushes Security Tools Consolidation

Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million. The post Wiz Acquires ...

Continue reading
  78 Hits

LastPass Employee Targeted With Deepfake Calls

LastPass this week revealed that one of its employees was targeted in a phishing attack involving deepfake technology. The post LastPass Employee Targ...

Continue reading
  49 Hits

‘BatBadBut’ Command Injection Vulnerability Affects Multiple Programming Languages

A critical vulnerability in multiple programming languages allows attackers to inject commands in Windows applications. The post ‘BatBadBut’ Command I...

Continue reading
  49 Hits

Threat Actors Manipulate GitHub Search to Deliver Malware

Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code. The post Threat Actors Manipulate GitHub Search to De...

Continue reading
  46 Hits

Palo Alto Networks Warns of Exploited Firewall Vulnerability

Palo Alto Networks warns of limited exploitation of a critical command injection vulnerability leading to code execution on firewalls. The post Palo A...

Continue reading
  68 Hits

House Will Try Again on Reauthorization of US Spy Program After Republican Upheaval

Speaker Mike Johnson is expected to bring forward a Plan B that would reform and extend Section 702 of the Foreign Intelligence Surveillance Act for a...

Continue reading
  61 Hits

Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars

Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.  The post Exploitation ...

Continue reading
  51 Hits

XZ backdoor story – Initial analysis

OnMarch29,2024,asinglemessageontheOpenwallOSS-securitymailinglistmarkedanimportantdiscoveryfortheinformationsecurity,opensourceandLinuxcommunities:the...

Continue reading
  51 Hits

US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts "presents a grave and unacceptable risk to federal agencie...

Continue reading
  58 Hits

US Cyber Force Assisted Foreign Governments 22 Times in 2023

USCYBERCOM’s Cyber National Mission Force participated in 22 foreign hunt forward operations in 2023. The post US Cyber Force Assisted Foreign Governm...

Continue reading
  42 Hits

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed...

Continue reading
  50 Hits

Knostic Emerges From Stealth With Enterprise Gen-AI Access Controls

Startup Knostic emerges from stealth mode with $3.3 million in funding and a gen-AI access control product for enterprises. The post Knostic Emerges F...

Continue reading
  67 Hits

Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks. The post Inside...

Continue reading
  73 Hits

Simbian Emerges From Stealth With $10 Million to Build Autonomous AI-Based Security Platform

Simbian aims to build a fully autonomous security platform that lets humans make the strategic decisions while AI implements those decisions. The post...

Continue reading
  61 Hits

I Got A Virus and I Don't Know What To Do!

I Need Help!