Pulse of Truth

233 readers
137 users here now

Cyber Security news and links to interesting things. This community is mostly fed by an instance of Dittybopper.

founded 8 months ago
MODERATORS
1
 
 

Claims customer data, prod environment not affected as NCC sounds alarm TeamViewer on Thursday said its security team just "detected an irregularity" within one of its networks – which is a fancy way of saying someone broke in.…

2
 
 

Investigation launched after airline reported a suspicious network popped up during a domestic flight in AprilFollow our Australia news live blog for latest updatesGet our morning and afternoon news emails, free app or daily news podcastA man has been charged after he allegedly set up fake free wifi networks at Australian airports and on domestic flights to steal personal data from unsuspecting members of the public.The 42-year-old Western Australian man is facing nine cybercrime charges and was due to appear in Perth magistrates court on Friday.Sign up for Guardian Australia’s free morning and afternoon email newsletters for your daily news roundup Continue reading...

3
 
 

Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not just a fraud or security problem, it is also a business problem. Scraper bots have a negative effect on many facets of the organization, including revenue, competitive edge, brand identity, customer experience, infrastructure costs, and digital experience. With its reliance on revenue-generating web applications, the ecommerce … More → The post Web scraping is not just a security or fraud problem appeared first on Help Net Security.

4
 
 

No supply-chain attacks to see over here! After having its website shut down, the polyfill.io owner is fighting back against claims it smuggled suspicious code onto websites all across the internet.…

5
 
 

Shifts in the cyber threats landscape have changed the way today’s CISOs evaluate their business’s risk appetite, according to Netskope. CISO risk appetite levels Specifically, 92% of CISOs report that these changes are creating tensions with their CEO and other members of the C-suite, and 66% say they are “walking a tightrope” between what the business wants and what makes sense from a security perspective. Contradicting legacy stereotypes of the CISO as inherently risk averse, … More → The post CISOs becoming more comfortable with risk levels appeared first on Help Net Security.

6
 
 

A blog underscoring the importance of cyber threat intelligence in reference to the recent Nobelium attacks

7
5
submitted 20 hours ago* (last edited 20 hours ago) by [email protected] to c/[email protected]
 
 

A competitor of the infamous Atomic Stealer targeting Mac users, has just launched a new campaign to lure in more victims.

8
 
 

Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones in an unauthorized manner. Tracked as CVE-2024-27867, the authentication issue affects AirPods (2nd generation and later), AirPods Pro (all models), AirPods Max, Powerbeats Pro, and Beats Fit Pro. "When your headphones are seeking a connection request to one of your previously

9
 
 

Jason Koebler / 404 Media: Researchers in Rabbit R1's jailbreaking community say Rabbit left critical API keys hardcoded in its code, which would let hackers use Rabbit's internal systems  —  Members of a community focused on jailbreaking and reverse engineering the Rabbit R1 AI assistant device say that Rabbit left …

10
 
 

Actual Victim: Evolve Bank, Now Dealing With Open Banking Enforcement Action by FedMore reasons to beware breathless reporting about a ransomware group's latest supposed victim: LockBit's claim to have breached the U.S. Federal Reserve Bank. Instead, the actual victim is Evolve Bancorp, which is currently dealing with an enforcement action by - wait for it - the Fed.

11
 
 

Affected devices could include wireless access points, routers, switches and VPNs.

12
 
 

The vulnerability affects not only AirPods, but also AirPods Max, Powerbeats Pro, Beats Fit Pro, and all models of AirPods Pro.

13
 
 

A CISA analysis in collaboration with international partners concluded most critical open source projects potentially contain memory safety vulnerabilities

14
 
 

Joseph Cox / 404 Media: Sources: AU10TIX, an ID verification service that handles ID photos and is used by TikTok, Uber, X, and others, exposed admin credentials online for over a year  —  A company that verifies the identities of TikTok, Uber, and X users, sometimes by processing photographs of their faces …

15
 
 

Australian study finds GPS trackers – and sometimes AirTags – are in demand for the wrong reasons Tracking devices are in demand from organized crime groups and known perpetrators of domestic violence, according to an Australian study.…

16
 
 

Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired the domain and modified the JavaScript library ("polyfill.js") to redirect users to malicious and scam sites. More than 110,000 sites that embed the library are impacted by the supply chain attack, Sansec said in a Tuesday report. Polyfill is a popular library that

17
 
 

Securing your data is more critical than ever, new research reveals.

18
 
 

Microsoft vows to make more changes facing EU fine over Teams bundling.

19
 
 

Red Teaming security assessments aim to demonstrate to clients how attackers in the real world might link together various exploits and attack methods to reach their objectives. The post Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming (Insights from the Field) appeared first on Security Boulevard.

20
 
 

The FBI is warning of cybercriminals posing as law firms and lawyers that offer cryptocurrency recovery services to victims of investment scams and steal funds and personal information. [...]

21
22
 
 

As originally reported by Forbes, due to a high-severity vulnerability, Google has warned federal employees to update their Pixel devices before 4th July, or else they should stop using the device. This warning—CVE-2024-32896—is a part of the Known Exploited Vulnerabilities (KEV) catalog managed by CISA (Cybersecurity…Read more...

23
 
 

As the 2024 Olympic Games in Paris approach, organizers are intensifying cybersecurity measures in response to warnings from experts and law enforcement agencies about a likely surge in cyberattacks. The Games, set to start on 26 July this year, are projected to sell over 13 million tickets and attract more than 15 million visitors to Paris, generating around 11 billion euros in economic activity. Big Events Attract Bad Attention, Too And because cybercriminals are like pickpockets, always following the crowds, this massive influx of commerce and data makes the event an attractive target for...

24
 
 

The Windows ecosystem was traditionally designed to treat users fairly, offering unprecedented openness and software backward compatibility that turned a "simple" OS into a major force in the technology and computing world. However, fairness, compatibility, and openness are now somewhat obsolete concepts, as Big Tech proactively harvest users' data to...Read Entire Article

25
view more: next ›