New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…
Category: EN
Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products
Johnson Controls has patched a critical vulnerability that can be exploited to take complete control of Frick industrial refrigeration products. The post Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products appeared first on SecurityWeek. This article has been indexed…
Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing
Microsoft hired Sam Altman and another architect of OpenAI for a new venture after their sudden departures shocked the artificial intelligence world. The post Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing appeared first on…
Morgan Stanley Ordered to Pay $6.5 Million for Exposing Customer Information
Morgan Stanley agrees to pay $6.5 million for exposing personal information through negligent data-security practices. The post Morgan Stanley Ordered to Pay $6.5 Million for Exposing Customer Information appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Maximizing Data Security: Why Simply Factory Resetting Your Android Phone Won’t Suffice Before Selling
In today’s tech landscape, concerns about smartphone data privacy are increasingly prevalent. While many may not possess highly sensitive information, the thought of unauthorized access to personal data remains unsettling. Despite following common safety practices online, uncertainties persist…
Fortify Your Online Business – Security Tips for Starting an e-Commerce Website
By Owais Sultan E-commerce is a lucrative business, but it requires hard work and robust cybersecurity. This is a post from HackRead.com Read the original post: Fortify Your Online Business – Security Tips for Starting an e-Commerce Website This article…
Yamaha Ransomware Attack: Employees Personal Information Exposed
A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the company. Notably, a third party gained unauthorized access to one of the servers run by Yamaha Motor Philippines, Inc. (YMPH),…
Hackers accessed sensitive health data of Welltok patients
Hackers accessed the personal data of more than a million people by exploiting a security vulnerability in a file transfer tool used by Welltok, the healthcare platform owned by Virgin Pulse. Welltok, a Denver-based patient engagement company that works with…
Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies
Russia-linked cyberespionage group APT29 has been observed leveraging the CVE-2023-38831 vulnerability in WinRAR in recent attacks. The Ukrainian National Security and Defense Council (NDSC) reported that APT29 (aka SVR group, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes) has been exploiting the CVE-2023-38831 vulnerability in…
Konni Campaign Distributed Via Malicious Document
FortiGuard Labs exposes the KONNI campaign’s distribution of using a counterfeit Russian military operation document. Read more on the details of the attack chain. This article has been indexed from Fortinet Threat Research Blog Read the original article: Konni…