6 Infotainment Bugs Allow Mazdas to Be Hacked With USBs

Direct cyberattacks on vehicles are all but unheard of. In theory though, the opportunity is there to cause real damage — data extraction, full system compromise, even gaining access to safety-critical systems.

darkreading – ​Read More

Nigerian national gets 10-year sentence for stealing $20 million through business email compromise scams

Babatunde Francis Ayeni and two alleged co-conspirators defrauded more than 400 people nationwide through scams targeting the real estate industry.

The Record from Recorded Future News – ​Read More

Mystery Hackers Target Texas Oilfield Supplier in Ransomware Attack

It remains unclear how the attackers gained access to Newpark Resources’ system, or what they plan to do with any stolen data the strike may have spewed out.

darkreading – ​Read More

Preparing for DORA Amid Technical Controls Ambiguity

The European Union’s Digital Operational Resilience Act requires financial entities to focus on third-party risk, resilience, and testing.

darkreading – ​Read More

US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ Hack

The US government’s CFPB sent an email with a simple directive: “Do NOT conduct CFPB work using mobile voice calls or text messages.”

The post US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms, Phone Use Warning in US Agency

Noteworthy stories that might have slipped under the radar: China’s Volt Typhoon hacked Singtel, GuLoader targets European industrial organizations, and US agency warns employees about phone use. 

The post In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms, Phone Use Warning in US Agency appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities

Hackers can exploit critical vulnerabilities in Mazda’s infotainment system, including one that enables code execution via USB, compromising…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

CISA’s Jack Cable on secure-by-design pledge progress — and next steps

The pledge, and CISA’s broader secure-by-design initiative, are key parts of the White House’s push to hold tech companies accountable for the cascading harms of poorly designed products and vulnerable software.

The Record from Recorded Future News – ​Read More

FBI says hackers are sending fraudulent police data requests to tech giants to steal people’s private information

The warning is a rare admission from the FBI about the threat from fake emergency data requests submitted by hackers with access to police email accounts.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

How Developers Drive Security Professionals Crazy

The journey toward a successful DevSecOps implementation is complex, requiring a strategic approach to overcome the myriad challenges it presents.

darkreading – ​Read More