Portugal’s Tekever raises $74M for dual-use drone platform deployed to Ukraine

Dual-use drone startup Tekever has raised €70 million ($74 million) to develop its product and expand into new markets, specifically the U.S.. The news is part of a trend of smaller tech-driven startups moving into markets normally dominated by large ‘defense primes’. It also shows that unmanned aerial drones are becoming far more sophisticated, in […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Linux Variant of Helldown Ransomware Targets VMware ESX Servers

Cybersecurity firm Sekoia has discovered a new variant of Helldown ransomware. The article details their tactics and how…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Inside the Booming ‘AI Pimping’ Industry

AI-generated influencers based on stolen images of real-life adult content creators are flooding social media.

Security Latest – ​Read More

Cyera Raises $300 Million at $3 Billion Valuation

Data security firm Cyera has raised $300 million in Series D funding, which brings the total investment in the company to $760 million. 

The post Cyera Raises $300 Million at $3 Billion Valuation appeared first on SecurityWeek.

SecurityWeek – ​Read More

Ford Says Leaked Data Comes From Supplier and Is Not Sensitive

Ford has completed its investigation into recent data breach claims and determined that its systems and customer data have not been compromised.

The post Ford Says Leaked Data Comes From Supplier and Is Not Sensitive appeared first on SecurityWeek.

SecurityWeek – ​Read More

Web Security 101: Understanding Cross-Origin Resource Sharing (CORS)

Continuing the web security headers series, after covering HSTS (Strict Transport Security), and CSP (Content Security Policy), now comes a more painful security header, so to speak. Painful, at least for web developers. And if we don’t want to generalize, CORS represented a painful header, or something that I always needed to bypass on the localhost environment when started working on a new app.

Source

TechSplicer – ​Read More

African Reliance on Foreign Suppliers Boosts Insecurity Concerns

Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors.

darkreading – ​Read More

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.
Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications

The Hacker News – ​Read More

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild.
The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information.
“This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network

The Hacker News – ​Read More

Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities

Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.
The flaws are listed below –

CVE-2024-44308 – A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content
CVE-2024-44309 – A cookie management vulnerability in

The Hacker News – ​Read More