Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show.
The cybersecurity firm also confirmed connections between the malware and AcidRain, tying it to threat activity clusters associated with Russian military intelligence.
“AcidPour’s expanded capabilities would enable it to better

The Hacker News – ​Read More

Tesla Hack Team Wins $200K and a New Car

Zero Day Initiative awarded a total of $732,000 to researchers who found 19 unique cybersecurity vulnerabilities during the first day of Pwn2Own.

darkreading – ​Read More

Cross Tenant Microsoft 365 Migration

By Uzair Amir

With the massive adoption of Microsoft 365, encountering complex environments involving multiple tenants is becoming increasingly common.

This is a post from HackRead.com Read the original post: Cross Tenant Microsoft 365 Migration

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Ivanti Keeps Security Teams Scrambling With 2 More Vulns

Since the beginning of this year, the company has disclosed some seven critical bugs so far, almost all of which attackers have quickly exploited in mass attacks.

darkreading – ​Read More

NIST’s Vuln Database Downshifts, Prompting Questions About Its Future

NVD may be in peril, and while alternatives exist, enterprise security managers will need to plan accordingly to stay on top of new threats.

darkreading – ​Read More

Changing Concepts of Identity Underscore ‘Perfect Storm’ of Cyber Risk

Forgepoint Capital’s Alberto Yépez discusses how the concept of identity is changing: It doesn’t just mean “us” anymore.

darkreading – ​Read More

Apple’s iMessage Encryption Puts Its Security Practices in the DOJ’s Crosshairs

Privacy and security are an Apple selling point. But the DOJ’s new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.

Security Latest – ​Read More

New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio

Key provisions in the legislation would require AI developers to identify content created using their products with digital watermarks or metadata.

The post New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio appeared first on SecurityWeek.

SecurityWeek – ​Read More

How Can We Reduce Threats From the Initial Access Brokers Market?

The ready-made access IABs offer has become an integral part of the ransomware ecosystem. Here’s how to stop them before they can profit from your assets.

darkreading – ​Read More

Unpatched Zephyr OS Expose Devices to DoS Attacks via IP Spoofing

By Waqas

Is your organisation using Zephyr OS? Patch and update it to the latest version now!

This is a post from HackRead.com Read the original post: Unpatched Zephyr OS Expose Devices to DoS Attacks via IP Spoofing

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More