Date | Title | Description |
10.07.2025 | IronCore Labs Announces Breakthrough with Cloaked AI: Encrypted Training Data Makes AI Models Safe and Private | IronCore Labs: Lock Your-Data. Unlock Your AI.
IronCore Labs’ Cloaked AI now encrypts training data and models, ensuring AI privacy and security of production AI systems.
Data used to train AI models is a liability if not handled securely.”... |
25.04.2025 | Sober in Cyber and Lush Concepts Invite RSAC Attendees to Rockin’ Mocktails: An Alcohol-Free Networking Experience | Join us at the Rockin' Mocktails event during RSAC on April 28th
Sober in Cyber
Thank you to our Platinum sponsor Lush Concepts
An inclusive, alcohol-free afterparty during the RSA Conference featuring mocktails, music, and meaningful conne... |
13.12.2024 | В тренде VM: под прицелом продукты Windows, Ubuntu Server, Zyxel и другие | Хабр, привет! Я Александр Леонов, ведущий эксперт PT Expert Security Center. Мы с командой аналитиков Positive Technologies каждый месяц исследуем информацию об уязвимостях, полученную из баз и бюллетеней безопасности вендоров, социальных с... |
27.09.2024 | Как использовать YouTube для кражи файлов | Занимаясь исследованиями безопасности, я часто сталкиваюсь со странными причудами и поведением, которые могут пригодиться, разве что, в качестве весёлого фокуса на вечеринке. Тем не менее мне нравится их отслеживать. Кто знает, возможно, од... |
22.08.2024 | This strange iOS bug can crash your iPhone in seconds | Bored? Swipe all the way over to the App Library on your iPhone and type “”:: in the search bar. Congratulations! You’ve just crashed your iPhone. But don’t worry — it’s not permanent or serious, according to security researchers.
Mastodon ... |
01.08.2024 | Announcing The Sober Speakeasy at Hacker Summer Camp: Hosted by Sober in Cyber, Intezer, and Community Partners | Join Us at the Sober Speakeasy Aug 8
Sober in Cyber
Thank you to our Platinum sponsor Intezer
Arizona nonprofit and community sponsors bridge Black Hat and DEF CON conferences with an alternative, alcohol-free social event at the Las Vegas ... |
25.07.2024 | The Great Tech Meltdown: CrowdStrike and Microsoft’s Catastrophic Outage**
** | ** On July 19, 2024, the digital world was rocked by a seismic outage that left millions grappling with the infamous Blue Screen of Death (BSOD). The culprits? A faulty update from cybersecurity firm CrowdStrike and a coinciding issue with ... |
19.07.2024 | Major outages at CrowdStrike, Microsoft leave the world with BSODs and confusion | Enlarge / A passenger sits on the floor as long queues form at the check-in counters at Ninoy Aquino International Airport, on July 19, 2024 in Manila, Philippines.
Ezra Acayan/Getty Images reader comments 431
Millions of people outside the... |
29.06.2024 | В TeamViewer сообщили о хакерской атаке на корпоративную среду компании | Компания-разработчик программного обеспечения для удалённого доступа TeamViewer предупредила об атаке на её корпоративную среду. Она утверждает, что это была хакерская группа APT29.
«В среду, 26 июня 2024 года, наша группа безопасности обна... |
07.06.2024 | Nasty bug with very simple exploit hits PHP just in time for the weekend | Enlarge reader comments 35
A critical vulnerability in the PHP programming language can be trivially exploited to execute malicious code on Windows devices, security researchers warned as they urged those affected to take action before the ... |
04.06.2024 | Windows Recall demands an extraordinary level of trust that Microsoft hasn’t earned | Enlarge / The Recall feature as it currently exists in Windows 11 24H2 preview builds.
Andrew Cunningham reader comments 319
Microsoft’s Windows 11 Copilot+ PCs come with quite a few new AI and machine learning-driven features, but the tent... |
03.06.2024 | Ticketmaster hacked in what’s believed to be a spree hitting Snowflake customers | Enlarge
Getty Images reader comments 32
Cloud storage provider Snowflake said that accounts belonging to multiple customers have been hacked after threat actors obtained credentials through info-stealing malware or by purchasing them on onl... |
23.05.2024 | A root-server at the Internet’s core lost touch with its peers. We still don’t know why. | Enlarge reader comments 69
For more than four days, a server at the very core of the Internet’s domain name system was out of sync with its 12 root server peers due to an unexplained glitch that could have caused stability and security prob... |
17.04.2024 | Palo Alto Networks’ firewall bug under attack brings fresh havoc to thousands of companies | Palo Alto Networks urged companies this week to patch against a newly discovered zero-day vulnerability in one of its widely used security products after malicious hackers began exploiting the bug to break into corporate networks.
The vulne... |
17.04.2024 | Sober in Cyber to Host “Rockin' Mocktails” – An Alcohol-Free Networking Event at RSA Conference | Sober in Cyber
Sponsor the Rockin' Mocktails event at RSAC
Innovative non-profit organization announces its unique alcohol-free event during the RSA Conference, promoting inclusive and healthy networking opportunities
Rockin Mocktails is ab... |
16.04.2024 | Как мне удалось обнаружить уязвимость, связанную со слабыми ключами в Debian | Для новичков в сфере информационных технологий может быть открытием, что в следующем месяце мы отметим 16-ю годовщину одного знаменательного события: было выявлено, что в течение 18 месяцев пакет OpenSSL в Debian вырабатывал полностью предс... |
11.04.2024 | US government urges Sisense customers to reset credentials after hack | U.S. cybersecurity agency CISA is warning Sisense customers to reset their credentials and secrets after the data analytics company reported a security incident.
In a brief statement on Thursday, CISA said it was responding to a “recent com... |
08.04.2024 | Critical takeover vulnerabilities in 92,000 D-Link devices under active exploitation | Enlarge
Getty Images reader comments 46
Hackers are actively exploiting a pair of recently discovered vulnerabilities to remotely commandeer network-attached storage devices manufactured by D-Link, researchers said Monday.
Roughly 92,000 de... |
02.04.2024 | Adobe опровергла сканирование всех документов на ПК ИИ-помощником | Adobe заявила, что приложения для Windows с функциями ИИ не будут автоматически сканировать все документы на компьютере, если не включить эту опцию вручную. Ранее некоторые пользователи выразили обеспокоенность тем, что Adobe AI может незам... |
01.04.2024 | What we know about the xz Utils backdoor that almost infected the world | Enlarge
Getty Images reader comments 197
On Friday, a lone Microsoft developer rocked the world when he revealed a backdoor had been intentionally planted in xz Utils, an open source data compression utility available on almost all installa... |
30.03.2024 | CVE-2024-3094: бэкдор в популярной утилите XZ затрагивает множество популярных дистрибутивов Linux | Уязвимость CVE-2024-3094 в XZ Utils - популярной утилите сжатия формата XZ, включенной в большинство дистрибутивов Linux - может «позволить злоумышленнику нарушить аутентификацию sshd и получить удаленный несанкционированный доступ ко всей ... |
25.03.2024 | If You’re Trying To Stop Scammers From Using Your Site, Firing The Trust & Safety Team Might Not Be The Brightest Idea | I know that some people, including Elon Musk recently, have claimed that “trust & safety” is some sort of “euphemism for censorship.”
That is not true, and has never been true. The role of trust & safety has always been about buildi... |
15.03.2024 | How to verify a data breach | Over the years, TechCrunch has extensively covered data breaches. In fact, some of our most-read stories have come from reporting on huge data breaches, such as revealing shoddy security practices at startups holding sensitive genetic infor... |
05.03.2024 | After collecting $22 million, AlphV ransomware group stages FBI takedown | Enlarge
Getty Images reader comments 114
The ransomware group responsible for hamstringing the prescription drug market for two weeks has suddenly gone dark, just days after receiving a $22 million payment and standing accused of scamming a... |
28.02.2024 | Anycubic users say their 3D printers were hacked to warn of a security flaw | Image Credits: Anycubic
Anycubic customers are reporting that their 3D printers have been hacked and now display a message warning of an alleged security flaw in the company’s systems.
Numerous threads on news sharing site Reddit show simil... |
22.02.2024 | Ransomware associated with LockBit still spreading 2 days after server takedown | Enlarge
Getty Images reader comments 8
Two days after an international team of authorities struck a major blow at LockBit, one of the Internet’s most prolific ransomware syndicates, researchers have detected a new round of attacks that are ... |
19.02.2024 | Поломанные VPN, 2038 год и сертификаты с истёкшим сто лет назад сроком | В конце 2010 года Зимми (псевдоним) работал в ИТ-поддержке компании, разрабатывавшей VPN-устройства и операционную систему для них. В понедельник ему позвонил клиент (розничный продавец продукции из США), рассказавший, что в выходные его VP... |
23.01.2024 | Администратору хакерского форума BreachForums суд США дал 20 лет освобождения под надзором | В США создателю и администратору хакерского форума BreachForums Конору Pompompurin Фицпатрику вынесли приговор. Обвинение просило 15 лет тюрьмы. Фицпатрика арестовали 15 марта 2023 года, потом выпустили под залог в $300 тысяч, но в январе 2... |
10.01.2024 | Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks | Enlarge
Getty Images reader comments 7
Unknown threat actors are actively targeting two critical zero-day vulnerabilities that allow them to bypass two-factor authentication and execute malicious code inside networks that use a widely used ... |
05.01.2024 | Ivanti warns of critical vulnerability in its popular line of endpoint protection software | Enlarge reader comments 20
Software maker Ivanti is urging users of its end-point security product to patch a critical vulnerability that makes it possible for unauthenticated attackers to execute malicious code inside affected networks.
Th... |
22.12.2023 | These are the cybersecurity stories we were jealous of in 2023 | Back in 2018, my former colleague at VICE Motherboard Joseph Cox and I started publishing a list of the best cybersecurity stories that were published elsewhere. It wasn’t just a way to tip our hats at our friendly competitors; by pointing ... |
18.12.2023 | How to protect unmanaged devices in today’s zero-trust world | Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here.
All it takes is a single hijacked browser session or unprotected third-party device on a network to shut a... |
29.11.2023 | ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation | Enlarge
Getty Images reader comments 68
Security researchers are tracking what they say is the “mass exploitation” of a security vulnerability that makes it possible to take full control of servers running ownCloud, a widely used open sourc... |
28.11.2023 | Hackers spent 2+ years looting secrets of chipmaker NXP before being detected | Enlarge
Getty Images reader comments 47
A prolific espionage hacking group with ties to China spent over two years looting the corporate network of NXP, the Netherlands-based chipmaker whose silicon powers security-sensitive components foun... |
27.11.2023 | Cyberattack on legal tech provider causing widespread disruption to UK law firms | CTS, a U.K.-based provider of managed IT services for law firms and the professional services industry, is experiencing a cybersecurity incident that is causing ongoing widespread disruption across the legal sector.
In a statement on its we... |
22.11.2023 | Atomic Stealer Distributes Malware to Macs Through False Browser Downloads | Anti-malware software provider Malwarebytes has described a new variant of Atomic Stealer (also known as AMOS), which is malware targeting Apple users. The new malware variant, distributed through the fake browser update delivery mechanism ... |
21.11.2023 | BEWARE: Atomic macOS Stealer Malware Appears as Fake Safari, Chrome Updates | Isaiah Richard, Tech Times 21 November 2023, 07:11 pm
Do not believe everything you see online and always be vigilant, as the return of notorious Mac malware is back at it again, now pushing for a fake Safari and Google Chrome browser updat... |
06.11.2023 | Critical vulnerability in Atlassian Confluence server is under “mass exploitation” | Enlarge reader comments 36 with
A critical vulnerability in Atlassian’s Confluence enterprise server app that allows for malicious commands and resets servers is under active exploitation by threat actors in attacks that install ransomware,... |
19.10.2023 | The latest high-severity Citrix vulnerability under attack isn’t easy to fix | Enlarge
Getty Images reader comments 35 with
A critical vulnerability that hackers have exploited since August, which allows them to bypass multifactor authentication in Citrix networking hardware, has received a patch from the manufacturer... |
06.10.2023 | Дорогая, я уменьшил пакет npm | Вы когда-нибудь задумывались, что скрывается за пакетом npm?
По сути, это не что иное, как сжатый gzip'ом архив. При разработке программного обеспечения исходный код почти всегда поставляется в виде файлов .tar.gz или .tgz. Сжатие gzip подд... |
21.08.2023 | Исследователь безопасности использовал Raspberry Pi и Bluetooth-адаптер для отправки системных уведомлений на iPhone | Исследователь безопасности Джей Бокс (Jae Bochs) провёл во время конференции Def Con эксперимент, в котором отсылал системные уведомления пользователям iPhone. Уведомления просили поделиться паролем с рядом находящимся Apple TV или подключи... |
16.08.2023 | $70 Hacker Device Spoofs Apple Smartphones Into Sharing Password: Here's How It Works | Urian B., Tech Times 16 August 2023, 09:08 pm
While the most common form of hacking can sometimes be considered phishing, there are those that use a spoofing device to increases the accuracy of how bad actors can steal from individuals. A p... |
16.08.2023 | This $70 device can spoof an Apple device and trick you into sharing your password | Attendees at Def Con, one of the world’s largest hacking conferences, are used to weird shenanigans, such as a seemingly innocuous wall of computer screens that display people’s passwords sniffed over the conference Wi-Fi network. But at th... |
14.08.2023 | Researcher says they were behind iPhone popups at Def Con | Several attendees at the hacking conference Def Con reported seeing mysterious and persistent pop ups prompting them to use their Apple ID to connect to an Apple TV, or to share a password with an Apple TV nearby, according to attendee twee... |
08.08.2023 | Менеджеры паролей. Какие бывают и правда ли безопасны? | В 1997 году американский криптограф и специалист по компьютерной безопасности Брюс Шнайер написал первый в мире менеджер паролей — Password Safe.
Это была простая и бесплатная утилита для Windows 95 с примитивным пользовательским интерфейсо... |
02.08.2023 | Mondee security lapse exposed flight itineraries and unencrypted credit card numbers | Travel giant Mondee has secured an exposed database that was spilling sensitive customer information, including detailed flight and hotel itineraries and unencrypted credit card numbers.
Anurag Sen, a good-faith security researcher known fo... |
10.07.2023 | Security Week 2328: вторая критическая уязвимость в сервисе MoveIT | 6 июля компания Progress закрыла критическую уязвимость в программном обеспечении MoveIT. Это корпоративное ПО для обмена файлами, которое предусматривает как передачу данных через публичное облако, так и использование конфигурации с приват... |
07.07.2023 | MOVEit app mass-exploited last month patches new critical vulnerability | Enlarge
Lino Mirgeler/picture alliance via Getty Images reader comments 21 with
MOVEit, the file-transfer software exploited in recent weeks in one of the biggest cyberattacks ever, has received yet another security update that fixes a crit... |
25.05.2023 | Twitter Keeps Breaking In Dangerous Ways: Deleted Tweets Reappearing | A whole bunch of media articles are noting that Twitter users who deleted tweets have noticed in recent weeks that the deleted tweets have magically returned. There seems to be little rhyme or reason for which deleted tweets have returned, ... |
21.05.2023 | Как заразить видео. Поиск уязвимостей в декодерах H.264 | Современные стандарты сжатия видео — настоящее чудо скрытой сложности и результат десятилетий научной работы. Спецификация H.264 — это около 800 страниц правил, определяющих, как декодировать видео. Но чем больше сложности, тем выше риски д... |
16.05.2023 | Microsoft Is Scanning the Contents of Password-Protected Zip Archives | Microsoft is scanning password-protected and encrypted zip archives for malware, according to reports from security researchers.
Andrew Brandt, Principle Researcher at SophosLabs, took to Mastodon to report the issue:
Well, apparently #micr... |
16.05.2023 | Microsoft is scanning the inside of password-protected zip files for malware | Enlarge reader comments 82 with
Microsoft cloud services are scanning for malware by peeking inside users’ zip files, even when they’re protected by a password, several users reported on Mastodon on Monday.
Compressing file contents into ar... |
16.05.2023 | Microsoft is able to look inside your password protected zip files | Microsoft has been spotted scanning for malware within password protected zip files stored on its cloud services.
Security researcher Andrew Brandt was among those to notice that Microsoft appears to be bypassing passwords added to zip arch... |
19.04.2023 | NationsBenefits confirms thousands had personal data stolen in Fortra breach | Another corporate giant has confirmed thousands of healthcare members had information stolen in the cyberattack targeting Fortra customers.
Florida-based technology company NationsBenefits said in a data breach notice filed with New Hampshi... |
22.03.2023 | New victims come forward after mass-ransomware attack | The number of victims affected by a mass-ransomware attack, caused by a bug in a popular data transfer tool used by businesses around the world, continues to grow as another organization tells TechCrunch that it was also hacked.
Canadian fi... |
15.03.2023 | Security firm Rubrik is latest to be felled by GoAnywhere vulnerability | Enlarge
Getty Images reader comments 19 with
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Rubrik, the Silicon Valley data security company, said that it experienced a network intrusion made possible by a zero-day vuln... |
14.03.2023 | Security giant Rubrik says hackers used Fortra zero-day to steal internal data | Silicon Valley–based data security company Rubrik has come forward as the latest victim of the Fortra GoAnywhere zero-day vulnerability, which has been linked to hacks targeting a hospital chain and a bank.
In a blog post published on Tuesd... |
02.03.2023 | Hatch Bank says hackers used Fortra bug to steal 140,000 customer Social Security numbers | Hatch Bank, a digital-first bank that provides infrastructure for fintech companies offering their own brand credit cards, confirmed hackers exploited a zero-day vulnerability in the company’s internal file transfer software that allowed ac... |
21.02.2023 | Sensitive US military emails spill online | The U.S. Department of Defense secured an exposed server on Monday that was spilling internal U.S. military emails to the open internet for the past two weeks.
The exposed server was hosted on Microsoft’s Azure government cloud for Departme... |
21.02.2023 | US Military Emails Exposed Due to Simple Error in DoD Server; Here's What's Been Leaked | Griffin Davis , Tech Times 21 February 2023, 02:02 pm
Sensitive U.S. military emails were exposed because of a simple DoD cloud server error.
(Photo : Photo by FADEL SENNA/AFP via Getty Images)
A member of the Moroccan Royal Armed Forces lo... |
20.02.2023 | Weekly Economic Index: Microsoft restricts Bing AI chat, Egypt’s state assets for sale, cash scarcity protests in Nigeria. | Microsoft nips Bing AI in the bud
Last week, Microsoft announced plans to implement conversation limits to its chatbot- Bing AI to make it more helpful to users. Quoting the tech giant, The Verge reported that data has proven that the “vast... |
17.02.2023 | People are sharing shocking responses from the new AI-powered Bing, from the chatbot declaring its love to picking fights | Microsoft's new Bing chatbot has spent its first week being argumentative and contradicting itself, some users say.
The AI chatbot has allegedly called users delusional, and it even professed its love to Insider.
Advertisement
If you push i... |
15.02.2023 | Health info for 1 million patients stolen using critical GoAnywhere vulnerability | Enlarge
Getty Images reader comments 40 with
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
One of the biggest hospital chains in the US said hackers obtained protected health information for 1 million patients after ex... |
15.02.2023 | Ransomware gang uses new zero-day to steal data on 1 million patients | A prolific ransomware operation is back with old tricks — and new victims.
Community Health Systems (CHS), one of the largest healthcare providers in the United States with close to 80 hospitals in 16 states, confirmed this week that crimin... |
10.02.2023 | Taiwan fines car renting giant iRent for customer data spill | Taiwanese authorities have fined car rental and ridesharing giant iRent after TechCrunch revealed the company was spilling customers’ data and identity documents onto the open web for months.
According to local media reports, iRent, which i... |
30.01.2023 | Hotai Motor exposed thousands of iRent customer documents | Taiwanese automotive conglomerate Hotai Motor exposed reams of personal customer data from its car rental and carshare unit, iRent, until a security researcher found the data online last week.
Even then, it took the company a week — and the... |
11.01.2023 | Is ChatGPT a cybersecurity threat? | Since its debut in November, ChatGPT has become the internet’s new favorite plaything. The AI-driven natural language processing tool rapidly amassed more than 1 million users, who have used the web-based chatbot for everything from generat... |
03.01.2023 | Security Experts Call Out LastPass for Misleading Disclosure of Data Breach | (Credit: LastPass)LastPass has spent the second half of 2022 on the defensive following a pair of major data breaches. It has claimed users are not at risk, the subtext being that we should not be upset with LastPass. Some security experts ... |
30.12.2022 | LastPass accused of lying in security breach announcements | The reputation of LastPass has taken quite a battering over the past year, with the handling of security incidents doing nothing to improve things. Just last week the company gave an update about a security breach that took place back in Au... |
29.12.2022 | Some Tricks To Making Mastodon Way More Useful | It’s been interesting to watch over the last few months as tons of people have migrated from Twitter to Mastodon (or similar compatible ActivityPub-based social media platforms). I’ve noticed, however, that some people keep running into the... |
29.12.2022 | Эксперты по безопасности раскритиковали системы защиты LastPass | Эксперты по безопасности раскритиковали системы защиты менеджера паролей LastPass и отмечают, что не стоит доверять заявлениям компании о надёжном хранении данных пользователей.
Ранее в LastPass признали, что злоумышленники смогли взломать ... |
16.12.2022 | Twitter suspends multiple journalists who have been covering, criticizing Elon Musk | Twitter suspended several journalists' accounts on Thursday.
Many of the affected writers had been covering or criticizing Elon Musk in the preceding days.
Advertisement
Twitter on Thursday suspended several accounts belonging to prominent ... |
16.12.2022 | Elon Musk hasn't filed a police report about the 'crazy stalker' incident which sparked journalists' Twitter suspensions, LAPD says | The LAPD says Elon Musk hasn't filed a police report about the "crazy stalker" who followed his son.
Musk tweeted that the man had followed a car containing his son X Æ A-Xii, believing Musk was inside.
Advertisement
Elon Musk has... |
13.12.2022 | The Cyberlaw Podcast: ChatGPT Successfully Imitates a Talented Sociopath with Too Many Lawyers | It’s been a news-heavy week, but we have the most fun in this episode with ChatGPT. Jane Bambauer, Richard Stiennon, and I pick over the astonishing number of use cases and misuse cases disclosed by the release of ChatGPT for public access.... |
26.11.2022 | What Twitter Users Need To Know About Mastodon Security | |
- | iOS bug: Type in these four characters and your iPhone will crash | Apple does an admirable job of stamping out significant software bugs before they impact users, but issues do still occasionally slip through the cracks. On Wednesday, a security researcher on Mastodon revealed the existence of a bug in iOS... |
- | Twitter Bug Sees Deleted Tweets Restored for Some Users | Twitter is being plagued by a new bug that is causing all sorts of privacy issues. Tweets that had previously been deleted – including replies and retweets – have recently resurfaced onto user profiles.
Despite a new CEO, the influence of E... |
- | BeyondTrust reveals appliance vulnerability | A remote access management vulnerability has emerged in BeyondTrust appliances.
The security advisory is available to customers only, but security researcher Brian Krebs has obtained and published a copy.
BeyondTrust’s senior VP for product... |
- | Apple users warned about fake update that steals money, passwords | More On: malware
Beware: how online scammers are taking advantage of ‘Barbie’ mania Meta says ChatGPT-related malware is rising: ‘The new crypto’ Justice Department seizes website of major ransomware gang Android malware that steals passwor... |
- | Gmail Security Checkmark is Being Spoofed by Scammers | When Gmail rolled out blue checkmarks last month, the move was framed as an extra level of security, allowing users to easily identify emails from legitimate sources.
However, it seems that some scammers are able to easily spoof accounts, a... |
- | Beware, typing these 4 characters will make your iPhone crash: ‘Do at your own risk’ | Be careful what you text: Tech-sperts are warning iPhone users that typing certain characters into their device will inevitably cause it to crash.
“Do at your own risk,” warned Konstantin, a Mastodon researcher who discovered the bug, in an... |