News
Internet Archive exposed again – this time through Zendesk
Despite the Internet Archive's assurances it's back on its feet after a recent infosec incident, the org still appears to be in trouble after parties unknown claimed to hold access tokens to its Zendesk implementation and to have used them to send a mass email blast.…
Open source LLM tool primed to sniff out Python zero-days
Researchers with Seattle-based Protect AI plan to release a free, open source tool that can find zero-day vulnerabilities in Python codebases with the help of Anthropic's Claude AI model.…
Jetpack fixes 8-year-old flaw affecting millions of WordPress sites
in brief A critical security update for the near-ubiquitous WordPress plugin Jetpack was released last week. Site administrators should ensure the latest version is installed to keep their sites secure. …
Alleged Bitcoin crook faces 5 years after SEC's X account pwned
An Alabama man faces five years in prison for allegedly attempting to manipulate the price of Bitcoin by pwning the US Securities and Exchange Commission's X account earlier this year.…
ESET denies it was compromised as Israeli orgs targeted with 'ESET-branded' wipers
ESET denies being compromised after an infosec researcher highlighted a wiper campaign that appeared to victims as if it was launched using the Slovak security shop's infrastructure.…
Intel robustly refutes China's accusations it bakes in NSA backdoors
Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA).…
Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began
It's a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it's mistakenly hired a North Korean operative. The phony worker almost immediately begins exfiltrating sensitive data, before being fired for poor performance. Then the six-figure ransom demands – accompanied by proof of the stolen files – start appearing.…
Uncle Sam puts $10M bounty on Russian troll farm Rybar
The US has placed a $10 million bounty on Russian media network Rybar and a number of its key staffers following alleged attempts to sway the upcoming US presidential election.…
Troubled US insurance giant hit by extortion after data leak
US insurance provider Globe Life, already grappling with legal troubles, now faces a fresh headache: an extortion attempt involving stolen customer data.…
Brazilian police claim they've cuffed serial cybercrook behind FBI and Airbus attacks
Brazilian police are being cagey with the details about the arrest of a person suspected to be responsible for various high-profile data thefts.…
WeChat devs introduced security flaws when they modded TLS, say researchers
Messaging giant WeChat uses a network protocol that the app's developers modified – and by doing so introduced security weaknesses, researchers claim.…
Anonymous Sudan isn't any more: Two alleged operators named, charged
Hacktivist gang Anonymous Sudan appears to have lost its anonymity after the US Attorney's Office on Wednesday unsealed an indictment identifying two of its alleged operators.…
US contractor pays $300k to settle accusation it didn't properly look after Medicare users' data
A US government contractor will settle claims it violated cyber security rules prior to a breach that compromised Medicare beneficiaries' personal data.…
Critical default credential bug in Kubernetes Image Builder allows SSH root access
A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) thanks to default credentials being enabled during the image build process.…
Volkswagen monitoring data dump threat from 8Base ransomware crew
The 8Base ransomware crew claims to have stolen a huge data dump of Volkswagen files and is threatening to publish them, but the German car giant appears to be unconcerned.…
Critical hardcoded SolarWinds credential now exploited in the wild
A critical, hardcoded login credential in SolarWinds' Web Help Desk line has been exploited in the wild by criminals, according to the US Cybersecurity and Infrastructure Security Agency, which has added the security blunder to its Known Exploited Vulnerabilities (KEV) Catalog.…
China’s infosec leads accuse Intel of NSA backdoor, cite chip security flaws
A Chinese industry group has accused Intel of backdooring its CPUs, in addition to other questionable security practices while calling for an investigation into the chipmaker, claiming its products pose "serious risks to national security."…
Strengthen your cybersecurity with automation
Webinar In an era of ever-evolving cyber threats, staying ahead of potential security risks is essential.…
Internet Archive wobbles back online, with limited functionality
The Internet Archive has come back online, in slightly degraded mode, after repelling an October 9 DDoS attack and then succumbing to a raid on users' data.…
IBM acquires Indian SaaS startup Prescinto to shine a light on renewable energy assets
IBM announced on Tuesday it has acquired Prescinto – a Bangalore-based provider of asset performance management software for renewable energy.…