CDK Attack: Why Contingency Planning Is Critical for SaaS Customers

Daily operations at some 15,000 automotive dealers remain impacted as CDK works to restore its dealer management system, following what appears to be a ransomware attack last week.

darkreading – ​Read More

What Building Application Security Into Shadow IT Looks Like

AppSec is hard for traditional software development, let alone citizen developers. So how did two people resolve 70,000 vulnerabilities in three months?

darkreading – ​Read More

Hacker Claims TEG Ticket Vendor Breach: 30M User Records for Sale

Hacker “Sp1d3r” claims breaching TEG, an Australian ticketing giant, exposing 30 million users’ data for sale on Breach Forums for USD 30,000.

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Chinese Hackers Have Stepped Up Attacks on Taiwanese Organizations, Cybersecurity Firm Says

A suspected Chinese state-sponsored hacking group has stepped up its targeting of Taiwanese organizations, particularly those in sectors such as government, education, technology and diplomacy.

The post Chinese Hackers Have Stepped Up Attacks on Taiwanese Organizations, Cybersecurity Firm Says appeared first on SecurityWeek.

SecurityWeek – ​Read More

Tech Leaders Gather This Week for AI Risk Summit + CISO Forum at the Ritz-Carlton, Half Moon Bay

SecurityWeek’s AI Risk Summit + CISO Forum brings together business and government stakeholders to provide meaningful guidance on risk management and cybersecurity in the age of artificial intelligence.

The post Tech Leaders Gather This Week for AI Risk Summit + CISO Forum at the Ritz-Carlton, Half Moon Bay appeared first on SecurityWeek.

SecurityWeek – ​Read More

30M Potentially Affected in Tickettek Australia Cloud Breach

In an incident with direct parallels to the recent Ticketmaster compromise, an Aussie live events giant says it was breached via a third-party cloud provider, as ShinyHunters takes credit.

darkreading – ​Read More

Google Introduces Project Naptime for AI-Powered Vulnerability Research

Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry out vulnerability research with an aim to improve automated discovery approaches.
“The Naptime architecture is centered around the interaction between an AI agent and a target codebase,” Google Project Zero researchers Sergei Glazunov and Mark Brand said. “The agent is provided

The Hacker News – ​Read More

New SnailLoad Attack Relies on Network Latency Variations to Infer User Activity

New attack named SnailLoad allows a remote attacker to infer websites and videos viewed by a user without direct access to network traffic.

The post New SnailLoad Attack Relies on Network Latency Variations to Infer User Activity appeared first on SecurityWeek.

SecurityWeek – ​Read More

Widespread Use of Rafel RAT Puts 3.9 Billion Android Devices at Risk

The new Rafel RAT is an Android malware capable of stealing data, spy on you, and even lock your phone. Keep your Android updated, download apps safely, and avoid phishing attacks to stay secure.

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

EFF Issues New Warning After Discovery of Automated License Plate Reader Vulnerabilities

The EFF has issued a warning over the use of automated license plate readers following the discovery of serious vulnerabilities. 

The post EFF Issues New Warning After Discovery of Automated License Plate Reader Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More