The alleged hacker claimed to have access to huge amounts of call records, including VP Kamala Harris and President Trump. © 2024 TechCrunch. All rights reserved. For personal use only.
Category: Global Security News
Donald Trump, Global Security News, Government & Policy, Joe Biden, North America, Social, TikTok, TikTok Ban
TikTok says it will go dark Sunday unless Biden offers ‘definitive statement’
It remains unclear whether TikTok will still be available in US app stores Sunday, with the company claiming that President Joe Biden’s outgoing administration needs to offer “definitive” assurances that it won’t enforce the ban. On Friday, the Supreme Court upheld a law that would effectively ban TikTok in the United States if the app’s…
Global Security News, Microsoft
Microsoft removes Assassin’s Creed Windows 11 upgrade blocks
Earlier this week, Ubisoft released Assassin’s Creed Valhalla and Assassin’s Creed Origins patches to fix Windows 11 24H2 compatibility issues that caused crashes, freezes, and audio problems. […]
Asia Pacific, Global Security News, Technology
Washington’s TikTok Ban Hypocrisy: Internet Censorship Is Good, Now
Tens of millions of people face the loss of an internet service they use to consume information from around the world. Their government says the block is for their own good, necessitated by threats to national security. The internet service is dangerous, they say, a tool of foreign meddling and a menace to the national…
Cybersecurity, data breach, EdTech, Global IT News, Global Security News, Hackers, hacking, infosec, K-12, powerschool, Security
How victims of PowerSchool’s data breach helped each other investigate ‘massive’ hack
School workers say they resorted to crowdsourcing help among each other following PowerSchool’s breach, fueled by solidarity and the slow response from PowerSchool. © 2024 TechCrunch. All rights reserved. For personal use only.
Global Security News
Big Tech’s New Frenemy Era Is Here
In a twist, Elon Musk is getting along publicly with his bitter rivals.
Global Security News
Musk and MAGA Make For An Uncomfortable Fit
With Elon Musk ’s influence on President-elect Donald Trump felt everywhere and growing, Steve Bannon emerges as Musk’s loudest critic in Trump World.
Blog, Global Security News, Research, Security Bloggers Network
Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones
As the political landscape heats up, so does the activity in the cyber threat domain. High-profile events such as inaugurations often become a prime opportunity for cybercriminals to launch malicious campaigns. With Trump’s upcoming inauguration on January 20th, our research sheds light on the digital threats tied to such politically charged events, focusing on previous…
Asia Pacific, Global Security News
U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. “People’s Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including…
Global Security News
A TikTok Ban Is Imminent: What Are the Financial Stakes?
The app’s demise threatens to remove billions of dollars from the content creators and small businesses that rely on it.
Generative AI, Security, Global Security News
Secure AI? Dream on, says AI red team
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete. In a paper published this week, the authors, including Microsoft Azure CTO Mark Russinovich, described some of the team’s work and provided eight recommendations designed…
Global Security News
How a Little-Known Finnish Company Became One of the World’s Hottest Gadget Startups
Oura’s smart ring measures heart health and can predict when you may be getting sick
Global Security News
The $500 Million Debacle at Sonos That Just Won’t End
Companies update their apps all the time. This one annoyed customers, cratered the stock and cost the CEO his job.
Canoo, electric vehicles, EVs, Global IT News, Global Security News, Transportation
EV startup Canoo files for bankruptcy and ceases operations
Seven-year-old electric vehicle startup Canoo has filed for bankruptcy and will “cease operations immediately.” The company is liquidating its assets in a Chapter 7 proceeding in the Delaware Bankruptcy Court. The company said in a press release published late Friday that it was “in discussions with foreign sources of capital” that proved unsuccessful, and also…
advanced bot protection, Application Security, bots, Global Security News, imperva, Security Bloggers Network, thales
How Imperva Protects the Arts Industry from Ticketing Abuse by Carding Bots
The ticketing industry is under constant threat from malicious bots, with bad actors targeting these platforms for financial gain. Bots accounted for 31.1% of all traffic to entertainment platforms in 2024, with attacks ranging from scalping and credential stuffing to carding operations. When one public museum experienced a surge in fraudulent transactions, they turned to…
Asia Pacific, Cybercrime, Government, Global Security News
US hits back against China’s Salt Typhoon group
The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider campaign against Chinese-based hacking. On Friday the Department of the Treasury’s Office of Foreign Assets Control (OFAC) said it is sanctioning Sichuan Juxinhe Network Technology,…
AI, Amazon, Amazon Prime Air, crash, drone delivery, drones, Global IT News, Global Security News, In Brief, Prime Air, Transportation
Amazon suspends US drone deliveries following crash at testing facility
Amazon has paused testing of its delivery drones following a crash involving two of its models, according to Bloomberg. It’s the latest setback for Amazon’s beleaguered Prime Air program, which aims to deliver around 500 million packages a year to customers by the end of the decade. Bloomberg reports two Amazon drones crashed in rainy…
Global Security News
Supreme Court Upholds TikTok Shutdown
Justices reject the Chinese app’s First Amendment challenge to a federal law against “foreign adversary” control.
Gaming, Global Security News, Government
FTC cracks down on Genshin Impact gacha loot box practices
Genshin Impact developer Cognosphere (aka Hoyoverse) has agreed to a $20 million settlement with the U.S. Federal Trade Commission (FTC) over its gacha loot box monetization and is now banned from selling them to teens under the age of sixteen without parental consent. […]
Global Security News
Has the TikTok Ban Already Backfired on US Cybersecurity?
The Supreme Court has affirmed TikTok’s ban in the US, which has its users in revolt and is creating a whole new set of national cybersecurity concerns.
Global Security News, Security Bloggers Network, security-operation-center, SOC
A Brief Guide for Dealing with ‘Humanless SOC’ Idiots
image by Meta.AI lampooning humanless SOC My former “colleagues” have written several serious pieces of research about why a SOC without humans will never happen (“Predict 2025: There Will Never Be an Autonomous SOC”, “The “Autonomous SOC” Is A Pipe Dream”, “Stop Trying To Take Humans Out Of Security Operations”). But I wanted to write…
antitrust, ChatGPT, Exclusive, Global IT News, Global Security News, Google, Government & Policy, openai, sam altman
ChatGPT’s head of product will testify in the US government’s case against Google
The U.S. government has picked Nick Turley, ChatGPT’s head of product, to testify in its antitrust case against Google. © 2024 TechCrunch. All rights reserved. For personal use only.
Colonial Pipeline, Cybersecurity, Emerging Tech, Global Security News, pipeline rules, Transportation Security Administration (TSA)
TSA extends cyber requirements for pipeline owners
The Transportation Security Administration is locking in a pair of pipeline directives for additional years ahead of the looming White House transition. In a posting to the Federal Register on Friday, the Department of Homeland Security component said it ratified the Security Directive Pipeline-2021-01 series and the Security Directive Pipeline-2021-02 series and would extend the…
dashcam, Fundraising, Global IT News, Global Security News, netradyne, Point72 Private Investments, Startups, Transportation
Netradyne snags $90M at $1.35B valuation to expand smart dashcams for commercial fleets
Distracted driving is one of the leading causes of car accidents and a major reason why auto insurance premiums are expected to increase in 2025. For commercial fleets, that’s a nightmare. But for California-based startup Netradyne, it’s a tailwind. Netradyne provides fleet owners, including big names like Amazon, with AI-enabled dashcams that collect vehicle data…
Global Security News, Security Bloggers Network
How Can Generative AI be Used in Cybersecurity
The post How Can Generative AI be Used in Cybersecurity appeared first on AI Security Automation. The post How Can Generative AI be Used in Cybersecurity appeared first on Security Boulevard.
Global Security News, Guest Blog Post, SBN News, Security Bloggers Network, Top Stories
GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security
President Biden’s detailed executive order relating to cybersecurity is great to see. Biden’s order reflects the importance of cybersecurity at the highest levels – it is an issue of national security and should be treated as such. One of the … (more…) The post GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of…
acquisition, AI, Apps, Enterprise, Fundraising, generative ai, Global IT News, Global Security News, Perplexity, read.cv, Social, social network, Startups
Perplexity acquires Read.cv, a social media platform for professionals
Read.cv, a social media platform for professionals that competed with LinkedIn, has been acquired by AI-powered search engine Perplexity. As part of the deal, Read.cv will begin to wind down operations Friday. Users will be able to export their data, including their profiles, posts, and messages, until May 16. “We’ve long admired Perplexity and believe…
Global Security News
Employees Enter Sensitive Data Into GenAI Prompts Far Too Often
The propensity for users to enter customer data, source code, employee benefits information, financial data, and more into ChatGPT, Copilot, and others is racking up real risk for enterprises.
Global Security News, Security
Otelier data breach exposes info, hotel reservations of millions
Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests’ personal information and reservations for well-known hotel brands like Marriott, Hilton, and Hyatt. […]
Apps, Evergreen, Global IT News, Global Security News, TikTok, TikTok Ban
TikTok ban: How to download your videos and data
The Supreme Court has upheld a ban on TikTok. Before the app goes dark on Sunday, you’re probably wondering how to back up the dozens, hundreds, or even thousands of videos you may have on the platform. Whether you want to save your favorite videos or videos you posted yourself, here’s how to do it. And…
cybersecurity education, DEF CON 32, DEFCONConference, Global Security News, Infosecurity Education, Security Bloggers Network
DEF CON 32 – Bypass 101
Author/Presenter: Bill Graydon Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Bypass 101 appeared first on Security Boulevard.
Apps, character.ai, chatbots, games, Global IT News, Global Security News
AI startup Character AI tests games on the web
Character AI, a startup that lets users chat with different AI-powered characters, is now testing games on its desktop and mobile web apps to increase engagement on its platform. The games are available to Character AI’s paid subscribers and a limited set of users on the free plan. For this initial release, the company developed…
AI (Artificial Intelligence), architecture, Global Security News, Grok, Innovation, privacy, Security, Security Bloggers Network
The Comprehensive Guide to Understanding Grok AI: Architecture, Applications, and Implications
Explore the revolutionary Grok AI system in this comprehensive guide. From its sophisticated architecture to real-world applications, discover how this advanced AI assistant integrates with the X platform while maintaining robust privacy and security measures. The post The Comprehensive Guide to Understanding Grok AI: Architecture, Applications, and Implications appeared first on Security Boulevard.
Global Security News
15K Fortinet Device Configs Leaked to the Dark Web
The stolen firewall data is thorough but more than 2 years old now, meaning that most organizations following even basic security practices face minimal risk, hopefully.
Apps, Bluesky, Global IT News, Global Security News, moderation, Social, social media
Bluesky saw 17x increase in moderation reports in 2024 after rapid growth
Bluesky on Friday published its moderation report for the past year, noting the sizable growth the social network experienced in 2024 and how that affected its Trust & Safety team’s workload. It also noted that the largest number of reports came from users reporting accounts or posts for harassment, trolling, or intolerance — an issue…
AI, Apps, ChatGPT, generative ai, Global IT News, Global Security News, Open AI
ChatGPT’s newest feature lets users assign it traits like ‘chatty’ and ‘Gen Z’
Update: OpenAI officially announced this feature one week after some users reported the arrival, and then disappearance, of the new options. It’s possible they went live prematurely. OpenAI is introducing a new way for users to customize their interactions with ChatGPT, the company’s AI-powered chatbot. On Friday, OpenAI announced it is rolling out a new…
Global Security News, Security
Malicious PyPi package steals Discord auth tokens from devs
A malicious package named ‘pycord-self’ on the Python package index (PyPI) targets Discord developers to steal authentication tokens and plant a backdoor for remote control over the system. […]
AI Security, Biden National Cybersecurity Strategy, Cloud Security, Cyberlaw, Cybersecurity, Data Privacy, Data Security, DevOps, Donald Trump, Featured, foreign threat actors, Global Security News, Governance, Risk & Compliance, Mobile Security, Network Security, News, secure software supply chain, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight
The Good, the Bad, and the Politics of Biden’s Cybersecurity Order
President Biden in the last few days of his administration issued an expansive cybersecurity EO that touched on issues like software supply chain, AI, and foreign adversaries. Many approved of the effort, though there were concerns that the incoming administration will simply shelve it. The post The Good, the Bad, and the Politics of Biden’s…
Apps, Global IT News, Global Security News, Government & Policy, Social, TikTok, TikTok Ban, Trump
TikTok CEO responds to Trump, thanks him for trying to solve US ban
TikTok CEO Shou Zi Chew responded to comments made by Donald Trump regarding Friday’s Supreme Court ruling to ban the app in the U.S. In a video posted on TikTok, Chew said, “On behalf of everyone at TikTok and all our users across the country, I want to thank President Trump for his commitment to…
Blue Origin, Elon Musk, Global IT News, Global Security News, Space, SpaceX, Transportation
SpaceX and Blue Origin must investigate this week’s big rocket tests, FAA says
The Federal Aviation Administration is requiring Elon Musk’s SpaceX and Jeff Bezos’ Blue Origin to investigate what went wrong on their respective mega-rocket test flights this week. The regulator said both companies must perform what’s known as a “mishap investigation.” These probes involve the companies and the FAA working together to understand what went wrong,…
Biden, Biden administration, Chris Krebs, CISA, Cybersecurity and Infrastructure Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), disinformation, Disinformation Governance Board, Donald Trump, Global Security News, Government, Joe Biden, Josh Hawley, Kristi Noem, rand paul, Ron Johnson, Sen. Ron Johnson, Senate Homeland Security and Governmental Affairs Committee, supreme court, Trump, Trump Administration, U.S. Supreme Court
Noem: No anti-disinformation, misinformation action under her as DHS secretary
Department of Homeland Security secretary nominee Kristi Noem committed to senators Friday that if confirmed she would keep the department out of efforts to combat disinformation and misinformation, and pledged to make the Cybersecurity and Infrastructure Security Agency “smaller, more nimble.” The South Dakota governor’s remarks signal that the incoming Trump administration will act on…
AI, ai models, Biotech & Health, ChatGPT, Global IT News, Global Security News, human longevity, In Brief, openai, TC
OpenAI is trying to extend human life, with help from a longevity startup
OpenAI says it trained a new AI model called GPT-4b micro with Retro Biosciences, a longevity science startup trying to extend the human lifespan by 10 years, according to the MIT Technology Review. Retro, which is backed by Sam Altman, has been working with OpenAI for roughly a year on this research, according to the…
Amazon, AWS, Climate, Enterprise, Global IT News, Global Security News, net zero, renewable energy, Solar Power, sustainability, Wind power
Amazon bought more renewable power last year than any other company
Amazon added around 100 new renewable projects last year. © 2024 TechCrunch. All rights reserved. For personal use only.
Asia Pacific, china, Cybercrime, Flax Typhoon, Global Security News, Office of Foreign Assets Control (OFAC), Salt Typhoon, Treasury Department
Treasury sanctions Chinese cybersecurity company, affiliate for Salt Typhoon hacks
The Department of the Treasury has sanctioned a Chinese national and a cybersecurity company based in Sichuan, China, for taking part in the Salt Typhoon hacking campaign that has swept up data from at least nine U.S. telecommunications companies. The department’s Office of Foreign Assets Control (OFAC) named Yin Kecheng of Shanghai and the Sichuan…
Apps, Evergreen, evergreens, fanbase, Global IT News, Global Security News, Government & Policy, Instagram Reels, lemon8, rednote, Snapchat, Social, TikTok, TikTok Ban, YouTube Shorts, zigazoo
As TikTok faces a US shutdown, here are some alternative apps to check out
TikTok has warned of a looming shutdown in just six days, as the Supreme Court is currently weighing the law that would ban the app. So we thought it’s time to take a look at other platforms that may be able to fill the TikTok-shaped hole in our lives. The law gives TikTok parent company…
Application Security, Biden, Biden administration, Biden National Cybersecurity Strategy, Biden-Harris, china, China-linked Hackers, China-nexus cyber attacks, Cloud Security, Cyberlaw, Cybersecurity, Data Privacy, Data Security, DevOps, Endpoint, executive order cybersecurity, executive order on cybersecurity, Featured, Federal Government, Global Security News, Governance, Risk & Compliance, Humor, Identity & Access, Incident Response, Industry Spotlight, IoT & ICS Security, Joe Biden, malware, Mobile Security, Most Read This Week, Network Security, News, Peoples Republic of China, Popular Post, President Biden, president cybersecurity executive order, presidential executive order cybersecurity, SB Blogwatch, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, Threats & Breaches, US Federal Government, vulnerabilities, White House, white house executive order cybersecurity framework
This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
Wow. Just Wow.: Joseph Robinette Biden Jr. hits the emergency “do something” button. The post This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump appeared first on Security Boulevard.
big tech, Blaize, Fundraising, Global IT News, Global Security News, nvidia, Startups, Startups Weekly, Venture
Big Tech expands its reach with new startup acquisitions and investments
Welcome to Startups Weekly — your weekly recap of everything you can’t miss from the world of startups. Want it in your inbox every Friday? Sign up here. This week’s newsletter is about startups, but it is also about Big Tech companies expanding their reach, both through acquisitions and through investments. Most interesting startup stories…
Apps, Global IT News, Global Security News, Google, Google Search, Javascript
Google begins requiring JavaScript for Google Search
Google says it has begun requiring users to turn on JavaScript, the widely-used programming language to make web pages interactive, in order to use Google Search. In an email to TechCrunch, a company spokesperson claimed that the change is intended to “better protect” Google Search against malicious activity, such as bots and spam, and to…
Cybersecurity, Featured, Global Security News, Incident Response, News, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight
Cohesity Extends Services Reach to Incident Response Platforms
Cohesity has extended its Cyber Event Response Team (CERT) service to include third-party providers of incident response platforms, including Palo Alto Networks Unit 42, Arctic Wolf, Sophos, Fenix24 and Semperis. The post Cohesity Extends Services Reach to Incident Response Platforms appeared first on Security Boulevard.
Asia Pacific, china, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), DARPA, Global Security News, nsa, Software
Closing software-understanding gap is critical to national security, CISA says
With Chinese-sponsored hackers lingering in the IT systems of various U.S. critical infrastructure networks, potentially imminent threats to the country’s national security abound. The Cybersecurity and Infrastructure Security Agency and federal partners hope to lessen that threat by closing a so-called “software understanding gap.” In a document released Thursday with the Defense Advanced Research Projects…
Cybersecurity, Global IT News, Global Security News, hacking, Salt Typhoon, Security, silk typhoon, us treasury
Treasury sanctions Salt Typhoon hacking group behind breaches of major US telecom firms
The US government has also sanctioned the hacker responsible for December’s US Treasury hack © 2024 TechCrunch. All rights reserved. For personal use only.
cyberattack, Cybersecurity, data breach, education, Exclusive, Global IT News, Global Security News, powerschool, Security, TC
Malware stole internal PowerSchool passwords from engineer’s hacked computer
The theft of a PowerSchool engineer’s passwords prior to the breach raises further doubts about the company’s security practices. © 2024 TechCrunch. All rights reserved. For personal use only.
Global Security News, Microsoft
Microsoft fixes Office 365 apps crashing on Windows Server systems
Microsoft has fixed a known issue that caused Microsoft 365 applications and Classic Outlook to crash on Windows Server 2016 or Windows Server 2019 systems. […]
Global Security News, Legal, Security
US sanctions Chinese firm, hacker behind telecom and Treasury hacks
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Yin Kecheng, a Shanghai-based hacker for his role in the recent Treasury breach and a company associated with the Salt Typhoon threat group. […]
Apps, bumble, dating apps, Global IT News, Global Security News, whitney wolfe herde
Bumble founder Whitney Wolfe Herd to reclaim CEO position in March
Bumble announced today that founder Whitney Wolfe Herd is returning as CEO after stepping down from the position in 2023. Wolfe Herd will succeed Lidiane Jones, the company’s current CEO who has left for “personal reasons,” Bumble explained. Jones, the former CEO of Slack, will continue her role at Bumble until the transition takes effect…
Global Security News
What Happens to TikTok Now That the Supreme Court Upheld Its Ban?
The company says it plans to go dark after the Supreme Court upheld a sell-or-ban law, but Trump could intervene.
Apps, Global IT News, Global Security News, Instagram, Meta, Social, social media, TikTok Ban
Instagram Reels rolls out new features for U.S. users as TikTok is banned
Instagram announced a timely update to its video feature Reels this morning, alongside the news that the Supreme Court upheld the law that will ban TikTok in the U.S. on January 19. The update, says Meta, will make it easier for users to discover the content that friends and followers are liking on the platform…
Global Security News
US Supreme Court Gives Green Light to TikTok Ban
The Supreme Court has upheld a law that could potentially ban TikTok in the US
Europe, Global Security News
Former European Leaders Call for Google Ad-Tech Breakup
A group of 18 former European heads of state have called on the European Commission to break up Google’s highly lucrative advertising-technology business, claiming it erodes Europe’s media landscape.
Global Security News, Security
FCC orders telecoms to secure their networks after Salt Tyhpoon hacks
The Federal Communications Commission (FCC) has ordered U.S. telecommunications carriers to secure their networks following last year’s Salt Typhoon security breaches. […]
Asia Pacific, Global Security News, Government & Policy, Social, TC, TikTok, TikTok Ban, Trump
Trump spoke to China’s President Xi about TikTok just ahead of Supreme Court ruling
Just ahead of today’s Supreme Court ruling — which saw the nation’s highest court uphold the law banning TikTok in the U.S. as of January 19 — Donald Trump posted on Truth Social that he had a “very good” phone call with China’s President Xi Jinping, which included discussion of TikTok. Though the U.S. president-elect…
Asia Pacific, Global Security News, Government & Policy, Social, TC, TikTok, TikTok Ban, Trump
Trump comments on TikTok ban
Just ahead of today’s Supreme Court ruling — which saw the nation’s highest court uphold the law banning TikTok in the U.S. as of January 19 — Donald Trump posted on Truth Social that he had a “very good” phone call with China’s President Xi Jinping, which included discussion of TikTok. In addition, the president-elect…
electric vehicles, EVs, Global IT News, Global Security News, Rivian, Transportation
Rivian finalizes $6.6B loan for its Georgia factory
Rivian and the Department of Energy have finalized a $6.6 billion loan announced in November with just a few days left until Donald Trump’s inauguration. The company will use the loan to help build out its planned factory in Georgia, east of Atlanta, with construction beginning in 2026. The first R2 SUVs are scheduled to…
Global Security News
Lazarus Group Targets Developers in New Data Theft Campaign
SecurityScorecard identified a new campaign in which the North Korean Lazarus group aims to steal source code, secrets and cryptocurrency wallet keys from developer environments
Enterprise, Global IT News, Global Security News, Instabase
Instabase raises $100M to help companies process unstructured document data
Instabase, a company that creates software for extracting processing unstructured data from myriad document types, has raised $100 million in a Series D round of funding. The announcement comes as companies struggle under a deluge of data — data that can unlock key business insights. Indeed, most of the data that companies generate is “unstructured,”…
Apps, Global IT News, Global Security News, Government & Policy, Social, supreme court, TikTok, TikTok Ban
Supreme Court upholds TikTok ban
The Supreme Court has upheld the law that will effectively ban TikTok on Sunday, January 19. The decision marks the end of TikTok’s months-long legal fight against a law that essentially forces the ByteDance-owned app to shut down unless it divests its U.S. operations. As of Sunday, it will be illegal for app stores and…
CDK Global, Commentary, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), Global Security News, MOVEit Transfer, resilience, Salt Typhoon, Volt Typhoon
Restoring U.S. cyber resilience: A blueprint for the new administration
As the incoming Trump administration prepares to take office, it confronts a critical juncture for cybersecurity. The escalating digital threats from state-sponsored adversaries like China, Iran, North Korea and Russia coincide with fractured global governance and a shifting domestic policy landscape. This moment presents a unique opportunity for the administration to establish itself as a…
Global Security News
Leveraging Behavioral Insights to Counter LLM-Enabled Hacking
As LLMs broaden access to hacking and diversify attack strategies, understanding the thought processes behind these innovations will be vital for bolstering IT defenses.
Global Security News, Microsoft
Microsoft starts force upgrading Windows 11 22H2, 23H3 devices
Microsoft has started the forced rollout of Windows 11 24H2 to eligible, non-managed systems running the Home and Pro editions of Windows 11 22H2 and 23H2. […]
Global Security News, Security Bloggers Network, Tools & Techniques, vulnerabilities, Vulnerability Research
Tarbomb Denial of Service via Path Traversal
As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, features deemed low priority may still be kept operational for legacy, compatibility, or business requirement reasons. Praetorian discovered such a legacy…
Climate, Denmark, Donald Trump, Founders Fund, Global IT News, Global Security News, Government & Policy, greenland, Ken Howery, PayPal Mafia, Real estate, Venture
Ken Howery: the tech mogul at the center of Trump’s Greenland ambition
Surprise! Donald Trump’s big, audacious ambition to buy Greenland from Denmark has a tech angle. Ken Howery, named by U.S. President-elect Trump’s pick to be the next ambassador to the country (and thus chief broker of any deal), is one more part of the rich seam of tech people running through Trump’s upcoming administration. Part…
Europe, Germany, Global Security News, Government & Policy, In Brief, Social, Twitter, X
Europe orders Elon Musk’s X to submit documents on its recommendation algorithms
The European Commission (EC) says it has requested information from Elon Musk’s X related to the algorithms that determine the content it recommends to users. The EC wants to determine how those algorithms may or may not be compliant with the Digital Services Act (DSA), which imposes key obligations on online platforms operating across the…
Artificial Intelligence, Global Security News
DORA-Umsetzung hält Banken-CISOs auf Trab
Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden. Doch viele kämpfen noch immer mit der Umsetzung. SkazovD – Shutterstock.com Ab heute am 17. Januar 2025 sind alle EU-Finanzinstitute verpflichtet, den Digital Operational Resilience Act (DORA) umzusetzen. Die EU-Richtlinie soll dazu beitragen, die Cybersicherheit in der Finanzbranche zu erhöhen. Studien zeigen jedoch, dass…
Global Security News
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. “These switches are widely used in building and home automation systems for a variety of networking applications,” Claroty’s Tomer Goldschmidt said in a Thursday report. “An attacker
BforeAI, Bitcoin, Crypto, Cybersecurity, disaster, Exploits, fraud, Global Security News, phishing, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Veriti
California Wildfires Spark Phishing Scams Exploiting Chaos
As Southern California continues to battle devastating wildfires, cybercriminals have seized the opportunity to exploit the chaos, targeting vulnerable individuals and organizations. The post California Wildfires Spark Phishing Scams Exploiting Chaos appeared first on Security Boulevard.
Global IT News, Global Security News, Government & Policy, Transportation
GM banned from sharing driving and location data with insurance companies
The order bans the automaker from selling consumers’ information to data brokers for five years. © 2024 TechCrunch. All rights reserved. For personal use only.
Global Security News, Managed Services
What is a Managed Service Provider (MSP)?
A managed service provider (MSP) is a third-party company that remotely manages a customer’s IT infrastructure and end-user systems. They deliver services like network, application, infrastructure, and security services through ongoing and regular support with active administration on customers’ premises. Small- and medium-sized businesses (SMBs), nonprofits, and government agencies that lack in-house resources hire MSPs…
APAC Channel News, Global IT News, Global Security News, News and Trends
NBN Upgrade An Early 2025 Boost For Australian MSPs
The Australian government’s latest $3.8 billion investment in NBN infrastructure presents significant opportunities for managed service providers and IT channel organizations as the network transitions away from copper-based connections by 2030. FTTP connectivity expands to more premises The upgrade, announced this week, will bring fiber-to-the-premises (FTTP) connectivity to an additional 622,000 premises currently served by…
Exploits, Global Security News
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. “Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps,” Imperva researcher Daniel Johnston said in an analysis. “These…
Blog, Global Security News, Security Bloggers Network
Yahoo Japan Enforces DMARC Adoption for Users in 2025
Yahoo Japan enforces DMARC, SPF, and DKIM protocols starting December 2024 to strengthen email security and combat phishing. The post Yahoo Japan Enforces DMARC Adoption for Users in 2025 appeared first on Security Boulevard.
Exploits, Global Security News, Security, Vulnerabilities
Poor patching regime is opening businesses to serious problems
Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a growing number of publicly disclosed vulnerabilities. According to an analysis by S&P Global Ratings, a joint division of S&P Global and the cyber risk analytics company Guidewire, almost three-quarters of organizations are either occasionally or infrequently remediating the vulnerabilities…
Global Security News
Star Blizzard Targets WhatsApp in New Campaign
Microsoft highlighted a new Star Blizzard campaign targeting WhatsApp accounts, as the group adapts its TTPs following the takedown of its infrastructure by law enforcement
Blog, Exploits, Global Security News, Security Bloggers Network
MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware
A MikroTik botnet exploited weak SPF configurations, spoofing 20,000 domains to launch widespread malspam campaigns. The post MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware appeared first on Security Boulevard.
Asia Pacific, Global Security News
Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants
AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China
Commentary, Department of Health and Human Services (HHS), Global Security News, health care
How HHS has strengthened cybersecurity of hospitals and health care systems
Hospitals and health systems across the country are experiencing a significant rise in cyberattacks. These cyber incidents have caused extended disruptions, patient diversion to other facilities, and the cancellation of medical appointments and procedures — all of which undermine patient care and safety. These attacks also expose vulnerabilities in our health care system and degrade…
Global Security News
Meta Going Down Twitter’s Path Won’t End the Same Way
Facebook and Instagram’s massive scale make them hard platforms for advertisers to avoid.
Global Security News
Can a Computer Learn to Speak Trader?
Compliance software firms are pushing artificial intelligence to decode Wall Street’s near-impenetrable jargon.
Global Security News
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,
Cybersecurity, dark web, Data Privacy, Data Security, Global Security News, Security, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Threats & Breaches, vulnerabilities
How Much of Your Business is Exposed on the Dark Web?
The dark web is a thriving underground market where stolen data and corporate vulnerabilities are openly traded. This hidden economy poses a direct and growing threat to businesses worldwide. Recent breaches highlight the danger. The post How Much of Your Business is Exposed on the Dark Web? appeared first on Security Boulevard.
Global Security News
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People’s Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation…
Global Security News
New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly…
AI, Enterprise, Fundraising, Global IT News, Global Security News, Index Ventures, Nexos.ai, Nord Security, nordvpn, Tomas Okmanas
Nord Security founders launch Nexos.ai to help enterprises take AI projects from pilot to production
A new AI orchestration startup from the founders of Lithuanian unicorn Nord Security is setting out to help enterprises put their AI projects into production, with an initial focus on bringing greater visibility, security and adaptability to large language models (LLMs). Nexos.ai, as the startup is called, is the handiwork of Tomas Okmanas (pictured above)…
Global Security News
DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
The EU’s DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms
AI, Cloud Security, cnapp, CSPM, Cybersecurity, Featured, Fortinet, Global Security News, News, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threats & Breaches
Security Concerns Complicate Multi-Cloud Adoption Strategies
While cloud adoption continues to drive digital transformation, the shift to the cloud introduces critical security challenges that organizations must address. The post Security Concerns Complicate Multi-Cloud Adoption Strategies appeared first on Security Boulevard.
Breach, Commerce, consumer, Cybersecurity, Global Security News, insider threat, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Vercara
Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises
Most consumers are still unaware of their own role in cybersecurity incidents and continue to place primary blame on external bad actors. The post Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises appeared first on Security Boulevard.
AI, Brad Pitt, Celebrities, celebrity, deepfake, Global Security News, Guest blog, Romance baiting, Scam
No, Brad Pitt isn’t in love with you
No, Brad Pitt isn’t in love with you. A French woman was duped into believing a hospitalised Brad Pitt had fallen in love with her. The scammers even faked a “breaking news” report announcing the revelation of Brad’s new love… Read more in my article on the Hot for Security blog.
Compliance, Financial Services Industry, Regulation, Security, Global Security News
EU’s DORA could further strain cybersecurity skills gap
Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market. DORA, which comes into full effect today, aims to improve the cybersecurity and operational resilience of financial institutions in the EU, including banks, insurance companies, and investment firms. The…
Asia Pacific, Global Security News
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users’ data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield…
Global Security News, Risk Management
Was ist ein Payload?
Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt lauerten, werden Payloads zum Beispiel in vermeintlich harmlosen Dateianhängen versteckt und starten ihren Angriff oftmals durch einen Trigger zu einem späteren Zeitpunkt. Foto: wk1003mike – shutterstock.com Der Begriff „Payload“ hat seinen Ursprung im Transportwesen. Dort beschreibt „Nutzlast“ die Menge…
Global Security News
Russian APT Phishes Kazakh Gov’t for Strategic Intel
A highly targeted cyber-intelligence campaign adds fuel to the increasingly complex relationship between the two former Soviet states.