Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm Aqua, in a report shared with The Hacker News, said a majority of the clusters belonged to small to medium-sized organizations, with a smaller subset tied to bigger companies, spanning financial, aerospace, automotive, industrial, and security sectors
New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet. The search giant said it’s introducing a second user setting to turn off support, at the model level, for null-ciphered cellular connections. “The Android Security Model assumes that all networks […]
Microsoft Releases Patches for 74 New Vulnerabilities in August Update
Microsoft has patched a total of 74 flaws in its software as part of the company’s Patch Tuesday updates for August 2023, down from the voluminous 132 vulnerabilities the company fixed last month. This comprises six Critical and 67 Important security vulnerabilities. Also released by the tech giant are two defense-in-depth updates for Microsoft Office (ADV230003) and […]
Edge computing’s role in healthcare
Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984 Cybersecurity.ATT.com with Theresa Lanowitz at BHUSA2023 from Security Guy TV on Vimeo.
Server breach could be fatal blow for LetMeSpy
A mobile app designed to let people spy on others will shortly be going out of business after a server breach and mass deletion incident. The app, LetMeSpy, sits silently and invisibly on a phone and collects call logs, location data, and even text messages. This kind of program is commonly referred to as stalkerware. […]
Digital assets continue to be prime target for malvertisers
Cyber-criminals continue to impersonate brands via well-crafted phishing websites. We previously covered attacks on both consumers and businesses via online searches for popular brands leading to scams or malware. Digital assets such as cryptocurrencies or NFTs are highly coveted by threat actors due to the high gains that can be made, even via a simple phishing […]
Novel ‘Inception’ Attack Exposes Sensitive Data in CPUs
By Habiba Rashid Dreams of Science Fiction Realized: ETH Researchers Demonstrate “Inception” Attack on CPUs. This is a post from HackRead.com Read the original post: Novel ‘Inception’ Attack Exposes Sensitive Data in CPUs
Top SEO Agencies in the UK: Expert Insights
By Owais Sultan Discover the top UK SEO companies, offering exceptional digital marketing services to drive qualified traffic & profits for your business. This is a post from HackRead.com Read the original post: Top SEO Agencies in the UK: Expert Insights
UK Electoral Commission Admits Major Data Breach Spanning Over a Year
By Habiba Rashid The compromised electoral registers contained information from 2014 to 2022, including the names and addresses of voters, both domestic and overseas. This is a post from HackRead.com Read the original post: UK Electoral Commission Admits Major Data Breach Spanning Over a Year
QakBot Malware Operators Expand C2 Network with 15 New Servers
The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The findings are a continuation of the malware’s infrastructure analysis from Team Cymru, and arrive a little over two months after Lumen Black Lotus Labs revealed that 25% of its C2 servers are only active […]