fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Integrating cybersecurity into vehicle design and manufacturing - Help Net Security

Integrating cybersecurity into vehicle design and manufacturing – Help Net Security

Integrating cybersecurity into vehicle design and manufacturing In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and connected vehicles. Edan highlights the challenges of technological advancements and outlines strategies for automakers to address cyber threats effectively. Additionally, he emphasizes the […]

Integrating cybersecurity into vehicle design and manufacturing – Help Net Security Read More »

Australia politics live: new anti-doxing laws to cover range of ‘malicious purposes’ for releasing personal information, Dreyfus says

Australia politics live: new anti-doxing laws to cover range of ‘malicious purposes’ for releasing personal information, Dreyfus says

Hate speech to be included in religious discrimination reforms Paul Karp Asked about the timing of hate speech laws, Mark Dreyfus appeared to confirm they will be included in and accelerate religious discrimination reforms. He said: We’ve already been working on the hate speech provisions. It is our intention to bring them forward with the

Australia politics live: new anti-doxing laws to cover range of ‘malicious purposes’ for releasing personal information, Dreyfus says Read More »

Week in review: 10 must-read cybersecurity books, AnyDesk hack, Patch Tuesday forecast - Help Net Security

Week in review: 10 must-read cybersecurity books, AnyDesk hack, Patch Tuesday forecast – Help Net Security

Week in review: 10 must-read cybersecurity books, AnyDesk hack, Patch Tuesday forecast Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How CISOs navigate policies and access across enterprises In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection

Week in review: 10 must-read cybersecurity books, AnyDesk hack, Patch Tuesday forecast – Help Net Security Read More »

Smart Helmets Flaw Exposed Millions to risk of Hacking and Surveillance

Smart Helmets Flaw Exposed Millions to risk of Hacking and Surveillance

According to cybersecurity firm Pen Test Partners, Livall’s smart helmets had an inherent flaw that could lead to the leaking of critical, sensitive user information including location data. The emergence of smart ski tech like Oakley/Recon goggles and smart ski helmet speakers have made skiing or biking a lot more fun but the dangers posed

Smart Helmets Flaw Exposed Millions to risk of Hacking and Surveillance Read More »

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits Read More »

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups

The Trojan.MAC.RustDoor backdoor is potentially linked to the notorious BlackBasta and (ALPHV/BlackCat) ransomware operators. Bitdefender researchers have discovered a new backdoor targeting macOS devices. The backdoor, dubbed, Trojan.MAC.RustDoor is written in Rust language and can steal specific files, archive them, and upload them to the C2 (command and control) server. According to the researchers, the

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups Read More »

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets —

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen Read More »

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect

UN sanctions monitors are investigating dozens of suspected cyber-attacks by North Korea that raked in $3bn to help it further develop its nuclear weapons programme, according to excerpts of an unpublished UN report reviewed by the Reuters news agency. “The Democratic People’s Republic of Korea (DPRK) continued to flout security council sanctions,” a panel of

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect Read More »

3 million smart toothbrushes were just used in a DDoS attack. Really

3 million smart toothbrushes were just used in a DDoS attack. Really

3 million smart toothbrushes were just used in a DDoS attack. Really It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reports that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets — transformed into soldiers in a

3 million smart toothbrushes were just used in a DDoS attack. Really Read More »

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts

The FBI is offering a $20,000 reward for anyone providing information to the agency regarding the whereabouts of cybersecurity expert Mu’min Al-Mawji Mahmud Salim, also known as ‘Taqni al-Mujahedeen’. The US Treasury Department announced sanctions today against two Egyptian nationals, Mu’min Al-Mawji Mahmud Salim (alias “Taqni al-Mujahedeen”) and Sarah Jamal Muhammad Al-Sayyid, for allegedly running

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts Read More »

Scroll to Top