Are your Venmo transactions still public? Here’s why – and how – to change that ASAP

You’re probably revealing more information than you realize when you use Venmo.

Latest stories for ZDNET in Security – ​Read More

CISA confirms Veeam vulnerability is being used in ransomware attacks

CISA added CVE-2024-40711 to its Known Exploited Vulnerabilities database and specified that the bug in Veeam software products is being used to facilitate ransomware attacks.

The Record from Recorded Future News – ​Read More

Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises

More than $50 million worth of cryptocurrency was stolen from decentralized finance platform Radiant Capital on Wednesday evening.

The Record from Recorded Future News – ​Read More

Supply Chain Cybersecurity Beyond Traditional Vendor Risk Management

Traditional practices are no longer sufficient in today’s threat landscape. It’s time for cybersecurity professionals to rethink their approach.

darkreading – ​Read More

In Other News: China Making Big Claims, ConfusedPilot AI Attack, Microsoft Security Log Issues

Noteworthy stories that might have slipped under the radar: China making claims about encryption cracking and Intel backdoors, ConfusedPilot AI attack, Microsoft loses security logs.  

The post In Other News: China Making Big Claims, ConfusedPilot AI Attack, Microsoft Security Log Issues appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft: macOS Vulnerability Potentially Exploited in Adware Attacks

The Adload macOS adware potentially exploits a privacy bypass vulnerability resolved in Sequoia 15 last month.

The post Microsoft: macOS Vulnerability Potentially Exploited in Adware Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Boston Children’s Health Physicians confirms September data breach

BCHP — which helps pair children with more than 300 doctors through 60 regional offices in New York and Connecticut — said intruders took patient data from its network in early September.

The Record from Recorded Future News – ​Read More

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your data secure in today’s fast-evolving landscape can feel like an impossible challenge.
But there’s a game-changing solution: Data Security Posture Management (DSPM). Think of it as a high-tech,

The Hacker News – ​Read More

North Korean APT Exploited IE Zero-Day in Supply Chain Attack

A Pyongyang-aligned APT was caught exploiting a recent zero-day in Internet Explorer in a supply chain attack.

The post North Korean APT Exploited IE Zero-Day in Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Rising Tides: Christien “DilDog” Rioux on Building Privacy and What Makes Hackers Unique

Veracode and Veilid Foundation co-founder discusses the “human rights issue” of accessible privacy and what makes hackers unique.

The post Rising Tides: Christien “DilDog” Rioux on Building Privacy and What Makes Hackers Unique appeared first on SecurityWeek.

SecurityWeek – ​Read More