By Ionut Arghire
Hackers accessed customer contact information and case data from Salesforce instances at Cloudflare, Palo Alto Networks, and Zscaler.
The post Security Firms Hit by Salesforce–Salesloft Drift Breach appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Marat Tyukov, Mikhail Gavrilov, and Pavel Akulov targeted US critical infrastructure and over 500 energy companies in 135 countries.
The post US Offers $10 Million for Three Russian Energy Firm Hackers appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Auchan confirms that the personal information of hundreds of thousands of customers was stolen in a data breach.
The post Hundreds of Thousands Affected by Auchan Data Breach appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
Alan Saquella, Assistant Professor at the College of Business, Security and Intelligence at Embry-Riddle Aeronautical University, discusses the red flags that precede a workplace violence incident.
Source:: Security magazin
Posted in Uncategorized | No Comments »
By SecurityWeek News
Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.
The post In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
The automotive company said it disconnected its systems, which severely impacted both retail and manufacturing operations.
The post Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution.
The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images.
The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Kevin Townsend
AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.
The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Authorities say VerifTools sold fake driver’s licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.
The post VerifTools Fake ID Operation Dismantled by Law Enforcement appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »