The latest generations of Intel processors, including Xeon chips, and AMD’s older Zen 1, Zen 1+, and Zen 2 microarchitectures on Linux are vulnerable to new speculative execution attacks that bypass existing ‘Spectre’ mitigations. […] Go to Source Author: Bill Toulas
Category Archives: Security
In 2024, the Federal Communications Commission (FCC) launched the K-12 Cybersecurity Pilot Program, a groundbreaking initiative backed by $200 million in funding. Learn more from Cynet about how schools and libraries can apply to this program. […] Go to Source Author: Sponsored by Cynet
Microsoft is warning enterprise customers that, for almost a month, a bug caused critical logs to be lost, putting at risk companies that rely on this data to detect unauthorized activity. […] Go to Source Author: Lawrence Abrams
A new ClickFix campaign is luring users to fraudulent Google Meet conference pages showing fake connectivity errors that deliver info-stealing malware for Windows and macOS operating systems. […] Go to Source Author: Bill Toulas
An Alabama man was arrested today by the FBI for his suspected role in hacking the SEC’s X account to make a fake announcement that Bitcoin ETFs were approved. […] Go to Source Author: Lawrence Abrams
North Korean IT professionals who trick Western companies into hiring them are stealing data from the organization’s network and asking for a ransom to not leak it. […] Go to Source Author: Bill Toulas
The BianLian ransomware group has claimed the cyberattack on Boston Children’s Health Physicians (BCHP) and threatens to leak stolen files unless a ransom is paid. […] Go to Source Author: Bill Toulas
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing data stolen from the company’s systems earlier this year. […] Go to Source Author: Bill Toulas
Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring, subdomain takeover detection and failed EC2 login detection. […] Go to Source Author: Sponsored by Blink Ops
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold on cybercriminal forums to enable cyberattacks from other threat actors. […] Go to Source Author: Ionut Ilascu
