Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack

The department’s Office of Foreign Assets Control said Guan Tianfeng used a zero-day exploit to deploy malware on 81,000 firewalls.

The post Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack appeared first on CyberScoop.

Continue reading Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack

Android warns of Qualcomm exploit in latest security bulletin

The November security bulletin includes two CVE’s reportedly exploited in the wild.

The post Android warns of Qualcomm exploit in latest security bulletin appeared first on CyberScoop.

Continue reading Android warns of Qualcomm exploit in latest security bulletin

House Intel Republicans request FBI, SEC briefing on Temu

Congressional Republicans on the House Permanent Select Committee on Intelligence are requesting a briefing from the FBI and Securities Exchange Commission on e-commerce app Temu and its parent company, Pinduoduo, saying both pose a potential threat to national security and the personal data of Americans. In a letter sent Tuesday to FBI Director Christopher Wray […]

The post House Intel Republicans request FBI, SEC briefing on Temu appeared first on CyberScoop.

Continue reading House Intel Republicans request FBI, SEC briefing on Temu

Google: apparent Russian hackers play copycat to commercial spyware vendors

The attack campaigns show how spyware tech companies have become more akin to nation-state threat actors.

The post Google: apparent Russian hackers play copycat to commercial spyware vendors appeared first on CyberScoop.

Continue reading Google: apparent Russian hackers play copycat to commercial spyware vendors

How Can Businesses Defend Themselves Against Common Cyberthreats?

TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zero-days, ransomware and deepfakes. Continue reading How Can Businesses Defend Themselves Against Common Cyberthreats?

Top 5 Global Cyber Security Trends of 2023, According to Google Report

According to the M-Trends report, the average time it takes for an organisation to detect an attacker in their environment has decreased from 16 days in 2022 to 10 days in 2023. Continue reading Top 5 Global Cyber Security Trends of 2023, According to Google Report

Exploitation of vulnerabilities almost tripled as a source of data breaches last year

Verizon’s annual data breach report identified the MOVEit hack as the “poster child” of the phenomenon.

The post Exploitation of vulnerabilities almost tripled as a source of data breaches last year appeared first on CyberScoop.

Continue reading Exploitation of vulnerabilities almost tripled as a source of data breaches last year

Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape

A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year. Continue reading Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape

What keeps CISOs up at night? Mandiant leaders share top cyber concerns

A trio of top brass for Mandiant shared the emerging advanced tactics, techniques and procedures that they see troubling cyber professionals.

The post What keeps CISOs up at night? Mandiant leaders share top cyber concerns appeared first on CyberScoop.

Continue reading What keeps CISOs up at night? Mandiant leaders share top cyber concerns