Apple Taking Legal Action Against UK Over Backdoor Demands

Apple told TechRepublic it is “gravely disappointed” to remove Advanced Data Protection in the U.K., as it fights government demands for an iCloud backdoor.

Security | TechRepublic – ​Read More

Former NSA official says federal worker cuts will have ‘devastating impact’ on cyber and national security

Former top U.S. cybersecurity official Rob Joyce told lawmakers on Wednesday that cuts to federal probationary employees will have a “devastating impact” on U.S. national security. Joyce, who was the director of cybersecurity for the National Security Agency until retiring in 2024, was providing testimony to the U.S. House Committee on the Chinese Communist Party, […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Chinese Silk Typhoon Group Targets IT Tools for Network Breaches

Microsoft warns that Chinese espionage group Silk Typhoon now exploits IT tools like remote management apps and cloud services to breach networks.

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform. 

The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform  appeared first on SecurityWeek.

SecurityWeek – ​Read More

Justice Department charges Chinese hackers-for-hire linked to Treasury breach

The individuals are accused of hacking over 100 U.S. organizations over the course of a decade

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Why Security Leaders Are Opting for Consulting Gigs

Many CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction?

darkreading – ​Read More

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks.
That’s according to new findings from the Microsoft Threat Intelligence team, which said the Silk Typhoon (formerly Hafnium) hacking

The Hacker News – ​Read More

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks.

The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.

SecurityWeek – ​Read More

Broadcom urges VMware customers to patch ‘emergency’ zero-day bugs under active exploitation

Security experts warn of ‘huge impact’ of actively exploited hypervisor flaws that allow sandbox escape

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Defending against USB drive attacks with Wazuh

USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization’s reputation. An example is the Stuxnet worm discovered in 2010, a malware designed to

The Hacker News – ​Read More