By Ionut Arghire
Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.
The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies.
The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.
The post Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ryan Naraine
Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.
The post Russian Hackers Bypass Gmail MFA with App Specific Password Ruse appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
Fighting back against social engineering requires security teams to understand how AI is reshaping these threats.
Source:: Security magazin


Posted in Uncategorized | No Comments »
By Eduard Kovacs
A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.
The post Swedish Truck Giant Scania Investigating Hack appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies.
The post High-Severity Vulnerabilities Patched by Cisco, Atlassian appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Marc Solomon
In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is.
The post Choosing a Clear Direction in the Face of Growing Cybersecurity Demands appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Eduard Kovacs
Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024.
The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Kevin Townsend
After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.
The post Encryption Backdoors: The Security Practitioners’ View appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »