By Ionut Arghire
The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums.
The post Arch Linux Project Responding to Week-Long DDoS Attack appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Eduard Kovacs
Netskope has an annual recurring revenue of more than $707 million, but it’s still not profitable, reporting a net loss of $170 million in H1.
The post SASE Company Netskope Files for IPO appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment.
The post CISA Requests Public Feedback on Updated SBOM Guidance appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications.
The post Anatsa Android Banking Trojan Now Targeting 830 Financial Apps appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Eduard Kovacs
Data I/O has disclosed a ransomware attack that disrupted the company’s operations, including communications, shipping and production.
The post Chip Programming Firm Data I/O Hit by Ransomware appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Eduard Kovacs
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data.
The post Aspire Rural Health System Data Breach Impacts Nearly 140,000 appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities.
The post Pakistani Hackers Back at Targeting Indian Government Entities appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
A recent survey found that when presented with an online safety issue, most teen respondents will ask for help from a parent or other trusted adult.
Source:: Security magazin


Posted in Uncategorized | No Comments »
A Business Continuity Plan is a silent safety net, but it requires regular maintenance.
Source:: Security magazin


Posted in Uncategorized | No Comments »
By Ionut Arghire
Proof-of-concept ransomware uses AI models to generate attack scripts in real time.
The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »