Content Paint

cybersecurity

Barracuda tells customers to dump infected email security appliances after breach

Customers were first hit in October 2022. End user telemetry flagged something remiss this month... IOCs and Yara rules now shared.

Millions of Gigabyte motherboards appear to be backdoored

“I know how I would do this intentionally and it would look exactly like this. You literally are downloading something from the internet and running it with the highest privileges on the system. It's easy to say 'oops! I didn't know..."

Hacking forum admin leaks data, 478,000 hackers exposed

A leak by a hacking forum admin has exposed the data of 478,000 members of RaidForums – a platform that sold payment card details and databases of login credentials, such as usernames and associated passwords for enterprises, among other black market activity. RaidForums was shut down in April 2022 following

Chinese state-backed hackers Typhoon Volt targeted US critical infrastructure

The group is intent on developing capabilities and access that “could disrupt critical communications infrastructure between the United States and Asia region during future crises.” Threat vector Fortinet has questions to answer ...

PyPI malicious project uploads force shutdown

An uptick in malicious new projects being created on the Python Package Index (PyPI) repository forced it to shut down new user registrations over the weekend in a worrying sign for the open source project. PyPI is a repository of open-source Python packages supplied by the worldwide community of Python

micron china security

Beijing claimed Sunday that it had found security issues in semiconductor firm Micron products that “pose a major security risk" to China

Why security pros are seething over Google’s new .zip domains

Google this week launched a new Top Level Domain of .zip and it has cybersecurity professionals worried. Here’s why. The way that modern browsers treat URLs – considering everything after @ as the host name, rather than the “user information” before it –  means that it is easy to create a convincing

Chinese APT taps trojanised routers for mystery purposes

Horse Shell has a "penchant for complex structures" (and simple errors)

Toyota spewed vehicle location data for millions onto unsecured cloud databases for 10 years

No lessons learned from last year's T-Connect source code exposure?

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.