Search results

  1. Father

    Пять основных принципов высокоэффективных практик DevSecOps

    Одна из постоянных проблем создания современных приложений - сделать их более безопасными без нарушения высокоскоростных процессов DevOps или ухудшения качества работы разработчиков. Современный ландшафт киберугроз изобилует изощренными атаками, нацеленными на все различные звенья цепочки...
  2. Father

    Вредоносное ПО SolarMarker развивается, чтобы противостоять попыткам удаления с помощью многоуровневой инфраструктуры

    Постоянные участники угрозы, стоящие за вредоносным ПО, крадущим информацию, SolarMarker, создали многоуровневую инфраструктуру, чтобы усложнить усилия правоохранительных органов по удалению, показывают новые результаты, полученные в результате записи Future. "Ядром операций SolarMarker...
  3. Father

    Доставка вредоносного ПО через облачные сервисы использует уловку Unicode для обмана пользователей

    Была замечена новая кампания атак, получившая название CLOUD #REVERSER, использующая законные облачные сервисы хранения данных, такие как Google Drive и Dropbox, для создания вредоносных полезных нагрузок. "Скрипты VBScript и PowerShell в CLOUD #REVERSER по своей сути включают действия...
  4. Father

    Критический недостаток корпоративного сервера GitHub позволяет обходить аутентификацию

    GitHub выпустила исправления для устранения ошибки максимальной серьезности в корпоративном сервере GitHub (GHES), которая может позволить злоумышленнику обойти средства защиты от аутентификации. Отслеживаемая как CVE-2024-4985 (оценка CVSS: 10.0), проблема может разрешать несанкционированный...
  5. Father

    Amazon, Google and Microsoft open to hackers: Fluent Bit bug gives access to data

    DoS attacks and code execution affect the largest cloud providers and IT giants. Tenable specialists have identified a critical vulnerability in Fluent Bit that can lead to a DoS attack and remote code execution. The flaw affects all major cloud providers, such as Amazon AWS, Google GCP, and...
  6. Father

    Slack Guide: "We will continue to feed AI your data, but don't worry"

    Which is more important: personalization or privacy? It seems that the company is not telling you something. In response to the dissatisfaction of users who were outraged that Slack's privacy principles allowed their data to be used for AI training, the company made changes to its rules...
  7. Father

    Neo-Luddites and Tech Stress: A Return to Phones with Minimal Features

    People are looking for phones with no extra features in an era of technology overload. Self-defined neo-Luddites and tech-stressed people are looking for phones with minimal features. Experts point to unstable profits and a shaky market for this niche segment. The impact of smartphones on your...
  8. Father

    The fall of the "Pharaoh": the head of Incognito Market appeared in court in the United States

    The organizer of a large marketplace will never see the light of day again. A 23-year-old Taiwanese man has appeared in federal court on charges of organizing and running the Incognito Market darknet. Rui-Xiang Lin was detained on May 17 at JFK Airport in New York. According to the US...
  9. Father

    Women's health and privacy: Disturbing discoveries

    Experts warn about possible data leaks and security breaches. A new study shows that women's health monitoring apps put women at risk by forcing them to disclose highly sensitive information and managing that data poorly. The study analyzed the privacy policies and data security tags of 20 of...
  10. Father

    Watch out, Black Widow: Latrodectus Weaves a Deadly Web for your Data

    Researchers have recorded a sharp increase in campaigns with the use of dangerous malware. Since the beginning of March this year, cybersecurity researchers have recorded a sharp increase in phishing campaigns aimed at distributing the new Latrodectus malware downloader (translated as "black...
  11. Father

    Cyberattack on OmniVision: how the digital invasion turned out for the mobile photography giant

    Employee passports, contracts, and NDA's – the company won't be able to forget this incident for a long time. OmniVision, a well-known manufacturer of image sensors that are now used to operate cameras in a variety of smartphones around the world, has announced a data security breach following...
  12. Father

    US resident faces 70 years for creating AI porn

    The man used Stable Diffusion to create prohibited materials. Stephen Anderegg, 42, a resident of Holman, Wisconsin, was arrested for creating, distributing, and possessing Child Sexual Abuse (CSAM) materials created using generative artificial intelligence. Anderegg allegedly used the popular...
  13. Father

    Two-faced Void Manticore: how Iran fights Tehran's enemies

    How hackers change identities to disrupt the network of Albania and Israel. The cybersecurity world is alarmed by new devastating attacks targeting Israel and Albania. An Iranian group linked to the Iranian Ministry of Intelligence and Security (MOIS) is behind the attacks. Check Point Research...
  14. Father

    CISA: vulnerability in the Mirth Connect system actively leads to leakage of medical data

    US federal agencies are required to update the software to the latest version by June 10. The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday, May 20, included a vulnerability affecting Mirth Connect from NextGen Healthcare in its catalog of known exploited vulnerabilities...
  15. Father

    GitCaught: Downloading programs on macOS can lead to data theft

    The campaign shows why it is harmful to pirate on Apple equipment. According to an Insikt Group report, cybercriminals are abusing GitHub and FileZilla to deliver infostilers and Trojans disguised as macOS programs-1Password, Bartender 5, and Pixelmator Pro. The campaign is called GitCaught...
  16. Father

    Every third cyberattack on Russian industry is linked to espionage

    Over the past three years, about 600,000 attempts of cyber attacks have been made on the industrial sector. Every third successful cyber attack on industrial enterprises is associated with espionage, according to an analytical report by the Solar Group of companies. Major incidents in the...
  17. Father

    NTLM rejection and new security features: Microsoft improves the security of Windows 11

    Already this year, the world will see an updated Windows 11 with a perfect protection system. Microsoft has officially confirmed plans to roll out NT LAN Manager (NTLM) in Windows 11 in the second half of 2024, announcing a number of new security measures to strengthen the protection of the...
  18. Father

    SWARM: A new threat to AI models in the cloud

    How do hackers turn neural networks into weapons at the click of their fingers? In the era of big data, training Vision Transformer (ViT) models on vast datasets has become the standard for improving performance in various AI tasks. Visual promptas (VP), which enter parameters for specific...
  19. Father

    Warning NAS users: 15 security holes found in QNAP products

    Why are 11 of them still uncorrected? During the security audit of the QTS operating system used in QNAP NAS products, fifteen vulnerabilities of varying severity were identified. It is noteworthy that eleven of them still remain uncorrected. Among the detected problems, CVE-2024-27130 stands...
  20. Father

    Kaspersky Lab: old vulnerabilities are back in fashion for hackers

    How Log4Shell, BlueKeep, and OpenSMTPD affect companies cybersecurity. Kaspersky Lab has published a new report, Cyber Threat Landscape for Russia and the CIS for the first quarter of 2024 and the entire year 2023. In the document, the Kaspersky Cyber Threat Intelligence team described in...
Top