With just days to go until the 2024 presidential election in the United States, WIRED reported on documents that revealed US government assessments about multiple components of election security and stability. First obtained by the national security transparency nonprofit Property of the People, one report distributed by the US Department of Homeland Security in October […]
Explore More
A popular device and application used by millions of individuals and businesses around the world to store documents is vulnerable to a zero-click flaw, a group of Dutch researchers have discovered. The vulnerability, which is called zero-click because it doesn’t require a user to click on anything to be infected, affects a photo application installed […]
Explore More
For years, it’s been an inconvenient truth within the cybersecurity industry that the network security devices sold to protect customers from spies and cybercriminals are, themselves, often the machines those intruders hack to gain access to their targets. Again and again, vulnerabilities in “perimeter” devices like firewalls and VPN appliances have become footholds for sophisticated […]
Explore More
On September 26, 2018, Venezuelan president Nicolás Maduro approached the lectern at the United Nations General Assembly in New York City. Hulking and mustachioed, wearing a black suit and a bright red tie, Maduro was in a bilious mood. At home, Maduro’s political position was deteriorating. The former bus driver turned autocrat had ruled Venezuela […]
Explore More
Drones, snipers, razor wire, sniffer dogs, body armor, bulletproof glass, and 24-hour armed security. This is not a list of protections in place for a visit by the president of the United States nor the contents of a shipment to frontline troops fighting in Ukraine. This is a list of the security measures election officials […]
Explore More
Apple has rushed out major macOS and iOS security updates to cover a pair of vulnerabilities already being exploited in the wild. The vulnerabilities, credited to Google’s TAG (Threat Analysis Group), are being actively exploited on Intel-based macOS systems, Apple confirmed in an advisory released on Tuesday. As is customary, Apple’s security response team did […]
Explore More
Misconfigured data science environments have been targeted by threat actors for sports stream ripping, according to cloud security firm Aqua Security. Honeypots operated by the company showed that cybercriminals are targeting misconfigured JupyterLab and Jupyter Notebook applications, which are web-based development environments for notebooks, code, and data. Aqua Security believes that Jupyter solutions are typically […]
Explore More
Satellite maker Maxar Space Systems is notifying its employees that their personal information was compromised in an October 2024 data breach. The incident, the company says, was discovered on October 11, and prompted an immediate response to block unauthorized access to its systems. However, the investigation into the matter revealed that a threat actor had […]
Explore More
The US government’s cybersecurity agency CISA on Tuesday confirmed that director Jen Easterly and deputy Nitin Natarajan will depart on January 20, clearing the way for a leadership overhaul by the incoming administration. A CISA spokesperson told SecurityWeek that all appointees of the Biden-Harris administration will leave by inauguration day. “All appointees of the Biden […]
Explore More
A Russian national allegedly involved in administering the Phobos ransomware appeared in court in the US after being extradited from South Korea. The man, Evgenii Ptitsyn, 42, was allegedly involved in the development of Phobos, and oversaw the sale, distribution, and operations of the ransomware, an indictment unsealed by the US Department of Justice shows. […]
Explore More