Cybersecurity M&A Roundup for First Half of June 2024

Roundup of the cybersecurity-related merger and acquisition (M&A) deals announced in the first half of June 2024.

The post Cybersecurity M&A Roundup for First Half of June 2024 appeared first on SecurityWeek.

SecurityWeek – ​Read More

US, Allies Publish Guidance on Securing Network Access

Government agencies in the US, New Zealand, and Canada have published new guidance on improving network security.

The post US, Allies Publish Guidance on Securing Network Access appeared first on SecurityWeek.

SecurityWeek – ​Read More

Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks

National passenger railroad company Amtrak is notifying customers that hackers have breached their Guest Rewards Accounts.

The post Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Perplexity Is a Bullshit Machine

A WIRED investigation shows that the AI search startup Perplexity is surreptitiously downloading your data.

Security Latest – ​Read More

New Case Study: Unmanaged GTM Tags Become a Security Nightmare

Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does business on every continent came unstuck when it forgot that you can’t afford to allow tags to go unmanaged or become misconfigured. 
Read the

The Hacker News – ​Read More

CISA Informs Organizations of Vulnerability in RAD SecFlow-2 Industrial Switch

CISA has notified RAD after finding a PoC exploit targeting a high-severity vulnerability in an outdated industrial switch.

The post CISA Informs Organizations of Vulnerability in RAD SecFlow-2 Industrial Switch appeared first on SecurityWeek.

SecurityWeek – ​Read More

Void Arachne Uses Deepfakes and AI to Deliver Malicious VPNs to Chinese Users

Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0.
“The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software, as well as

The Hacker News – ​Read More

Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software

A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital currency users on social media with information stealer malware and carries out cryptocurrency theft.
The attack chains involve the use of a purported virtual meeting software named Vortax (and 23 other apps) that are used as a conduit to deliver Rhadamanthys, StealC,

The Hacker News – ​Read More

IntelBroker Hacker Claims Apple Breach, Steals Source Code for Internal Tools

Notorious hacker IntelBroker claims to have breached Apple, stealing source code for internal tools. Learn about the alleged breach and IntelBroker’s history of targeting major companies and government entities.

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition

Google has released a Chrome 126 security update with six fixes, including four for externally reported high-severity flaws.

The post Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition appeared first on SecurityWeek.

SecurityWeek – ​Read More