Author: Cybernoz

[tl;dr sec] #217 - Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI
08
Feb
2024

[tl;dr sec] #217 – Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI

I hope you’ve been doing well! 📺️ Usable Security at Netflix How do you build security tooling & processes that…

Hospital
08
Feb
2024

Data breaches at Viamedis and Almerys impact 33 million in France

Data breaches at two French healthcare payment service providers, Viamedis and Almerys, have now been determined to impact over 33…

Webinar
08
Feb
2024

Critical Cisco Expressway Flaw Let Remote Execute Arbitrary Code

Cisco released patches to address multiple vulnerabilities in the Cisco Expressway Series that might allow an attacker to do arbitrary…

North Korea raked $3 billion from Ransomware and US offers $10m for Hive
08
Feb
2024

North Korea raked $3 billion from Ransomware and US offers $10m for Hive

Recent estimates suggest that North Korea has amassed approximately $3 billion through a series of ransomware attacks targeting businesses and…

LassPass is not LastPass: Fraudulent app on Apple App Store
08
Feb
2024

LassPass is not LastPass: Fraudulent app on Apple App Store

A fraudulent app named “LassPass Password Manager” that mimics the legitimate LastPass mobile app can currently be found on Apple’s…

LastPass logo
08
Feb
2024

Warning from LastPass as fake app found on Apple App Store

Password Manager LastPass has warned about a fraudulent app called “LassPass Password Manager” which it found on the Apple App…

HijackLoader
08
Feb
2024

Researchers Decode the Latest Evasion Methods

Feb 08, 2024NewsroomEndpoint Security / Cyber Threat The threat actors behind a loader malware called HijackLoader have added new techniques…

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites
08
Feb
2024

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites

E-commerce stores can lose out on a lot of revenue if price manipulation vulnerabilities get actively exploited by bad actors. …

2054, Part IV: A Nation Divided
08
Feb
2024

2054, Part IV: A Nation Divided

Wisecarver stepped across the threshold. “Good morning, Mr. President.” He gave a little nod. Beneath his arm he carried a…

Akira, LockBit actively searching for vulnerable Cisco ASA devices
08
Feb
2024

Akira, LockBit actively searching for vulnerable Cisco ASA devices

Akira and Lockbit ransomware groups are trying to breach Cisco ASA SSL VPN devices by exploiting several older vulnerabilities, security…

Chinese Hackers
08
Feb
2024

Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade

The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some…

SAP sustainability study reveals UK businesses lack funding
08
Feb
2024

Swedish CIO contributes best practices for ethical use of artificial intelligence

OpenAI writes on its website: “The amount of compute used in the largest AI [artificial intelligence] training runs has been…