DJing

Headliner R2 review | Juno Daily

A debut DJ mixer release from a young LA brand, the Headliner R2 provides more competition in the entry-level rotary mixer market. Greg Scarth puts it to the test. You’d be forgiven for not having heard of Headliner before. The young LA brand’s output so far has consisted mainly of cases and stands, but the […]

Cybersecurity

French regulators levy €32 million fine against Amazon for surveilling employees

France’s data protection authority fined Amazon €32 million ($34.7 million) for excessively monitoring employees in its large warehouses and for not deleting that data in a timely manner, among other alleged offenses it said violated the European Union’s General Data Protection Regulation (GDPR). The organization, the Commission Nationale Informatique et Libertés (CNIL), cited how an […]

Cybersecurity

The effect of omission bias on vulnerability management – Help Net Security

Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior. One of these is the omission bias, which has interesting ramifications in the world of cyber security, specifically vulnerability management. In this article, we discuss omission bias in vulnerability management, particularly vulnerability remediation, and how […]

Cybersecurity

UK tells business leaders to ‘toughen up’ against cyberattacks

The British government has told business leaders to “toughen up” their protections against cyberattacks and prioritize the threat as a key business risk similar to financial and legal challenges. It follows a government survey that identified “insufficient director involvement” in their organization’s cybersecurity, with just 30% of businesses having “board members or trustees explicitly responsible […]

Cybersecurity

China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software to deliver a sophisticated implant named NSPX30. Slovak cybersecurity firm ESET is tracking the advanced persistent threat (APT) group under the name Blackwood. It’s said to be active since at least 2018. […]

Cybersecurity

New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

Jan 25, 2024NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to deliver additional payloads onto compromised hosts for follow-on exploitation. Arctic Wolf Labs, which discovered the new attack tool in two recent intrusions, said the loader’s icon and name masquerades as the […]

Cybersecurity

Data from Indian Online Gaming Platforms Teenpatti.com and Mpl.live on Sale

Teenpatti.com and (Mobile Premier League)Mpl.live, two prominent online gaming platforms in India, may have experienced a data breach. Allegedly, a cybercriminal known as ‘roshtosh’ has put up for sale data claimed to be stolen from these platforms. The online gaming data breach, disclosed on January 22, 2024, following the threat activity on January 20, 2024, […]

Cybersecurity

Unmasking MacOS Malware in Pirated Apps | Cyware Hacker News

Jamf Threat Labs researchers warned against pirate applications distributing a backdoor to macOS users. The researchers noticed the apps appeared similar to ZuRu malware and allowed attackers to download and execute multiple payloads to compromise machines. First discovered According to researchers, the pirated applications are hosted on Chinese pirating websites. They first came across the […]