Cannabis company Stiiizy says hackers accessed customers’ ID documents

A ransomware gang took credit for the breach, claiming to have stolen over 400,000 government-issued identity documents from customers.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Banshee macOS Malware Expands Targeting

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.

The post Banshee macOS Malware Expands Targeting appeared first on SecurityWeek.

SecurityWeek – ​Read More

Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach

Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.

The post Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts

Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts.

The post PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts appeared first on SecurityWeek.

SecurityWeek – ​Read More

Banshee Stealer Hits macOS Users via Fake GitHub Repositories

SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.

The Hacker News – ​Read More

Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution.
The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14.
“Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote

The Hacker News – ​Read More

How AI will transform cybersecurity in 2025 – and supercharge cybercrime

From AI-driven defense to evolving ransomware tactics, here’s what cybersecurity industry leaders and experts are preparing for this year.

Latest stories for ZDNET in Security – ​Read More

Chinese APT Group Is Ransacking Japan’s Secrets

Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.

darkreading – ​Read More

Banshee 2.0 Malware Steals Apple’s Encryption to Hide on Macs

The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple’s own antivirus product.

darkreading – ​Read More