-
22 votes
-
The dangers of LLM self-exfiltration: AI alignment and cybersecurity challenges
5 votes -
Building automation giant Johnson Controls hit by ransomware attack
8 votes -
Popular thesaurus website used in sneaky cryptojacking scheme
11 votes -
New SprySOCKS Linux malware used in cyber espionage attacks
12 votes -
WinRAR zero-day exploited since April to hack trading accounts
31 votes -
FedFingerprinting: A federated learning approach to website fingerprinting attacks in Tor networks
6 votes -
Hackers exploited a zero-day flaw in Ivanti's software undetected for at least three months, US and Norwegian cybersecurity agencies warn
14 votes -
Microsoft lost its keys, and the US government got hacked
25 votes -
Apple fixes zero-days used to deploy Triangulation spyware via iMessage
8 votes -
Security expert defeats Lenovo laptop BIOS password with a screwdriver
13 votes -
SolarWinds: The untold story of the boldest supply-chain hack ever
7 votes -
A flock of chickens, held for ransom — Growing cyberattacks on Canada's food system threaten disaster
9 votes -
Belgium launches nationwide safe harbor for ethical hackers
10 votes -
Danish parliament urges lawmakers and employees to remove TikTok on work phones as a cybersecurity measure, saying “there is a risk of espionage”
4 votes -
SolarWinds and market incentives
8 votes -
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data.
12 votes -
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true
12 votes -
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
13 votes -
Finland's parliament hit with cyberattack following US move to admit the country to NATO
7 votes -
Macho cyberwarfare and the long game
2 votes -
Chipmaker Nvidia investigating potential cyberattack
6 votes -
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware
4 votes -
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough?
4 votes -
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients
9 votes -
Sinclair Broadcast Group was hit by ransomware over the weekend
13 votes -
Unsecure at any speed?
7 votes -
Norway says cyber attack on parliament carried out from China – attack had utilised a security hole in Microsoft's Exchange software
10 votes -
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab
24 votes -
Swedish Coop supermarkets shut due to US ransomware cyber-attack – the hack targeted Florida-based IT company Kaseya before spreading through corporate networks
8 votes -
NewsBlur Mongo database deleted in ransom attack (and restored)
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had...
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had sensitive private data there. We will likely find out more after the maintainer recovers from a busy night.
There are no good links for this, but it’s being discussed on Hacker News. Since it’s open source, someone described what’s being kept in that database.
(I use NewsBlur, but I don’t think my RSS reading habits are all that sensitive. Others might be in a different situation, though.)
6 votes -
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists
17 votes -
One-fifth of US beef capacity wiped out by JBS cyberattack
28 votes -
DarkSide ransomware gang quits after servers, Bitcoin stash seized
17 votes -
Largest fuel pipeline in the United States hit by ransomware attack
31 votes -
Ransomware gang threatens release of DC police records
10 votes -
A closer look at the DarkSide ransomware gang, which was responsible for the recent attack on Colonial Pipeline
15 votes -
After decades of not using them, the Pentagon has given control of millions of IP addresses to a previously unknown company in an effort to identify possible cyber vulnerabilities and threats
17 votes -
I now own the Coinhive domain. Here's how I'm fighting cryptojacking and doing good things with content security policies.
15 votes -
SolarWinds: New findings from our investigation of SUNBURST
6 votes -
70TB of Parler users’ messages, videos, and posts leaked by security researchers
42 votes -
VMware flaw a vector in SolarWinds breach?
7 votes -
Preliminary analysis of the SolarWinds Orion supply-chain nation-state attack
7 votes -
Microsoft says it found malicious software in its systems
7 votes -
Finland's parliament approved a bill designed to protect its networks against cyber threats and espionage – may be used to exclude China's Huawei and ZTE
4 votes -
Why the extortion of Vastaamo matters far beyond Finland – and how cyber pros are responding
4 votes -
Norway has blamed Russia for a cyberattack on the email system in the parliament in August – Moscow has rejected the claim, calling it a serious and wilful provocation
6 votes -
Microsoft faces complex technical challenges in TikTok carveout
5 votes -
New South Wales government was the target of major cyber attack operation linked to China
Article: New South Wales government was the target of major cyber attack operation linked to China Also: 'Cyber attacks' point to China's spy agency, Ministry of State Security, as Huawei payback,...
Article: New South Wales government was the target of major cyber attack operation linked to China
This is a follow-up to these articles posted yesterday:
8 votes -
Cyber-attack Australia: Sophisticated attacks from ‘state-based actor’, PM says
7 votes