Face off: Attackers are stealing biometrics to access victims’ bank accounts

Researchers found the first banking trojan that steals people’s faces, replaces them with deepfakes, then bypasses biometric tools.Read More

Security News | VentureBeat – ​Read More

‘Lucifer’ Botnet Turns Up the Heat on Apache Hadoop Servers

More than 3,000 unique attacks hitting Hadoop and Druid honeypots in just the past month indicate an attacker testing phase, portending fire and brimstone to come.

darkreading – ​Read More

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and the arrest of any individual participating in the operation.
“Since January 2020, LockBit actors have executed over 2,000 attacks against victims in the United States, and around the world, causing costly

The Hacker News – ​Read More

Cybercriminals are using Meta’s Llama 2 AI, according to CrowdStrike

Parts of code exploiting Microsoft’s PowerShell tool matches the style of output of large language models.

Latest stories for ZDNET in Security – ​Read More

Artificial Intelligence set to drive major tech advancements in 2024, IEEE study finds

A new global survey by the Institute of Electrical and Electronics Engineers (IEEE) finds artificial intelligence will be the top technology in 2024.Read More

Security News | VentureBeat – ​Read More

‘VoltSchemer’ Hack Allows Wireless Charger Takeovers

Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.

darkreading – ​Read More

Critical ConnectWise RMM Bug Poised for Exploitation Avalanche

Two days after disclosure, most instances of the remote desktop tool remain unpatched, while cyberattackers have started in-the-wild exploitation — and researchers warn it could get ugly, fast.

darkreading – ​Read More

El Al Flight Crew Suffers Midflight Communication Disruption

Though the incident took place over a known Houthi area, some say this incident was at the hands of a Somali group, based on frequent communication disruptions in the country.

darkreading – ​Read More

Types of SaaS Applications: Categories and Examples

By Uzair Amir

Learn about different types of SaaS solutions and the most widely used SaaS categories to create your own…

This is a post from HackRead.com Read the original post: Types of SaaS Applications: Categories and Examples

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics

ReversingLabs’ research revealed a broader campaign involving multiple packages and sophisticated tactics, indicating an emerging trend of DLL sideloading attacks in open-source environments.

Cyware News – Latest Cyber News – ​Read More