Microsoft rolls out expanded logging six months after Chinese breach

The technology giant has come under heavy criticism for not making robust logging features available by default. 

The post Microsoft rolls out expanded logging six months after Chinese breach appeared first on CyberScoop.

Continue reading Microsoft rolls out expanded logging six months after Chinese breach

Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt

By Deeba Ahmed
The aircraft was reportedly flying over an area inhabited by Iranian-backed Houthis.
This is a post from HackRead.com Read the original post: Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt
Continue reading Israeli El Al Alleges Hackers Targeted Flights in Mid-Air Hijack Attempt

State-backed hackers are experimenting with OpenAI models 

Microsoft and OpenAI say hackers from China, Iran, North Korea and Russia are exploring the use of large language models in their operations. 

The post State-backed hackers are experimenting with OpenAI models  appeared first on CyberScoop.

Continue reading State-backed hackers are experimenting with OpenAI models 

Hacking the flow: The consequences of compromised water systems

In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disr… Continue reading Hacking the flow: The consequences of compromised water systems

Smart Helmets Flaw Exposed Millions to Risk of Hacking and Surveillance

By Deeba Ahmed
According to cybersecurity firm Pen Test Partners, Livall’s smart helmets had an inherent flaw that could lead to…
This is a post from HackRead.com Read the original post: Smart Helmets Flaw Exposed Millions to Risk of Hacking and … Continue reading Smart Helmets Flaw Exposed Millions to Risk of Hacking and Surveillance

Synthetic Solutions: Redefining Cybersecurity Through Data Generation in the Face of Hacking

By Owais Sultan
Cybersecurity is a constant battleground where hackers continuously devise new strategies to breach defences, jeopardizing sensitive information and…
This is a post from HackRead.com Read the original post: Synthetic Solutions: Re… Continue reading Synthetic Solutions: Redefining Cybersecurity Through Data Generation in the Face of Hacking

Cloudflare Hacked After State Actor Leverages Okta Breach

By Deeba Ahmed
CloudFlare Server Were Hacked on Thanksgiving Day Using Auth Tokens Stolen in Okta Breach.
This is a post from HackRead.com Read the original post: Cloudflare Hacked After State Actor Leverages Okta Breach
Continue reading Cloudflare Hacked After State Actor Leverages Okta Breach

Hackers Uncover Airbus EFB App Vulnerability, Risking Aircraft Data

By Deeba Ahmed
In this instance, the hackers were white hat; otherwise, things could have gone awry.
This is a post from HackRead.com Read the original post: Hackers Uncover Airbus EFB App Vulnerability, Risking Aircraft Data
Continue reading Hackers Uncover Airbus EFB App Vulnerability, Risking Aircraft Data

Microsoft Executives Hacked

Microsoft is reporting that a Russian intelligence agency—the same one responsible for SolarWinds—accessed the email system of the company’s executives.

Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents. The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself. …

Continue reading Microsoft Executives Hacked