Six-year old bug will likely live forever in Lenovo, Intel products

A report from Binarly finds that a silently patched bug in a popular web server will likely live on in several major end-of-life products.

The post Six-year old bug will likely live forever in Lenovo, Intel products appeared first on CyberScoop.

Continue reading Six-year old bug will likely live forever in Lenovo, Intel products

Supply chain attack sends shockwaves through open-source community

An operation to undermine the software utility XZ Utils has exposed the fragile human foundations on which the modern internet is built.

The post Supply chain attack sends shockwaves through open-source community appeared first on CyberScoop.

Continue reading Supply chain attack sends shockwaves through open-source community

Chinese hackers turn to AI to meddle in elections

Hacking groups linked to the Chinese government are increasingly turning to deepfakes and other forms of AI-generated content when seeking to interfere in foreign elections, according to new research from Microsoft published Thursday. Beijing’s influence campaigns still rely on old standbys, such as using fake social media and news accounts, to spread state-backed propaganda, inject […]

The post Chinese hackers turn to AI to meddle in elections appeared first on CyberScoop.

Continue reading Chinese hackers turn to AI to meddle in elections

Healthcare’s cyber resilience under siege as attacks multiply

In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of employe… Continue reading Healthcare’s cyber resilience under siege as attacks multiply

AI abuse and misinformation campaigns threaten financial institutions

Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration The cybersec… Continue reading AI abuse and misinformation campaigns threaten financial institutions

Plan to resuscitate beleaguered vulnerability database draws criticism 

The National Vulnerability Database has ceased some of its work, but some experts fear the formation of a consortium to address its problems lacks sufficient urgency.

The post Plan to resuscitate beleaguered vulnerability database draws criticism  appeared first on CyberScoop.

Continue reading Plan to resuscitate beleaguered vulnerability database draws criticism 

95% of companies face API security problems

Despite the critical role of APIs, the vast majority of commercial decision-makers are ignoring the burgeoning security risk for businesses, according to Fastly. Application Programming Interfaces (APIs) have long been recognised as a bedrock of the di… Continue reading 95% of companies face API security problems

Fake data breaches: Countering the damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claim… Continue reading Fake data breaches: Countering the damage

Malware stands out as the fastest-growing threat of 2024

93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite th… Continue reading Malware stands out as the fastest-growing threat of 2024

Outsmarting cybercriminal innovation with strategies for enterprise resilience

In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a confere… Continue reading Outsmarting cybercriminal innovation with strategies for enterprise resilience