How to make open source software more secure

Earlier this year, a Microsoft developer realized that someone had inserted a backdoor into the code of open source utility XZ Utils, which is used in virtually all Linux operating systems.  The operation had started two years earlier when that someone, a person nicknamed JiaT75, started contributing to the XZ Utils repository on GitHub. A […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

California court suffering from tech outages after cyberattack

The San Joaquin County Superior Court said nearly all of its digital services have been knocked offline due to a cyberattack that began earlier this week.

The Record from Recorded Future News – ​Read More

Anthropic warns of AI catastrophe if governments don’t regulate in 18 months

‘The window for proactive risk prevention is closing fast,’ the company warns. Here’s why.

Latest stories for ZDNET in Security – ​Read More

Russia behind latest election disinformation video, US intel agencies say

Georgia’s secretary of state, a Republican, had already refuted the clip’s claims the previous day.

The Record from Recorded Future News – ​Read More

The biggest underestimated security threat of today? Advanced persistent teenagers

These attacks are highly effective, have caused huge data breaches and resulted in huge ransoms paid to make the hackers go away.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

IT Security Centralization Makes the Use of Industrial Spies More Profitable

As organizations centralize IT security, the risk of espionage is silently becoming a more profitable threat.

darkreading – ​Read More

Preying on Misconfigurations: EMERALDWHALE Operation Steals 15K Cloud Credentials

We are becoming accustomed to attackers gaining the upper hand due to basic security oversights. We already know that phishing tactics as unsophisticated as they look became one of the most effective one. Now, in the web, we have different basic security oversights. But the most prevalent is exposing private files, mainly ones that contain various credentials or API keys.

Source

TechSplicer – ​Read More

EMERALDWHALE Steals 15,000+ Cloud Credentials, Stores Data in S3 Bucket

EMERALDWHALE operation compromises over 15,000 cloud credentials, exploiting exposed Git and Laravel files. Attackers use compromised S3 buckets…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

NCSC Details ‘Pygmy Goat’ Backdoor Planted on Hacked Sophos Firewall Devices

A stealthy network backdoor found on hacked Sophos XG firewall devices is programmed to work on a broader range of Linux-based devices.

The post NCSC Details ‘Pygmy Goat’ Backdoor Planted on Hacked Sophos Firewall Devices appeared first on SecurityWeek.

SecurityWeek – ​Read More

Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel’s participation in the sporting event.
The activity has been pinned on an entity that’s known as Emennet Pasargad, which the agencies said has been operating

The Hacker News – ​Read More