Romanian Man Faces Up to 30 Years in US Prison Over Vishing Scams

Romanian national Gavril Sandu faces up to 30 years in a US prison after extradition over a VOIP vishing and fake debit card fraud scheme.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

I jailbroke my old Kindle to install KOReader – but there’s a better way to extend its life

With Amazon ending support for some Kindles, here are two ways to breathe new life into oudated models.

Latest news – ​Read More

Build Application Firewalls Aim to Stop the Next Supply Chain Attack

Rather than scanning code alone, Build Application Firewalls inspect runtime behavior inside the software build pipeline.

The post Build Application Firewalls Aim to Stop the Next Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

9-Year-Old Dirty Frag Vulnerability Enables Root Access on Linux Systems

The Dirty Frag vulnerability affects Linux systems and allows root access escalation, while public PoC exploit code increases attack risks.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

I tested whether Gemini, ChatGPT, and Claude can analyze videos – this one wins

Can AI really watch video, or does it just fake it? I tested my favorite AI tools on YouTube clips and local files to find the winner.

Latest news – ​Read More

UK water company allowed hackers to lurk undetected for nearly two years, regulator finds

The Information Commissioner’s Office (ICO) fined South Staffordshire Water £963,900 ($1.3 million) on Monday over an attack by the Cl0p ransomware group that led to the personal data of 633,887 customers and employees being published in August 2022.

The Record from Recorded Future News – ​Read More

Google Detects First AI-Generated Zero-Day Exploit

The zero-day was designed to bypass 2FA and it was developed by a prominent cybercrime group.

The post Google Detects First AI-Generated Zero-Day Exploit appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.

darkreading – ​Read More

Skoda Data Breach Hits Online Shop Customers

Using a vulnerability in the portal, hackers accessed names, addresses, email addresses, and phone numbers.

The post Skoda Data Breach Hits Online Shop Customers appeared first on SecurityWeek.

SecurityWeek – ​Read More

Your Purple Team Isn’t Purple — It’s Just Red and Blue in the Same Room

Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that’s longer than the exploitation window itself.
Nobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its

The Hacker News – ​Read More