“With the breakup of the Soviet Union, you had a lot of people with skills, without jobs,” Sabien explained. In Europe, hackers, some as young…
Tag: bug
The Hack Roundup: USDA Denies Data Breach at Payroll Facility – Nextgov
The U.S. Department of Agriculture has found “no evidence” of a data breach at a payroll processing center but is investigating, a spokesperson said in…
Suspected Chinese hackers breach US government via SolarWinds bug – Al Jazeera English
Suspected Chinese hackers exploited a flaw in software made by SolarWinds Corp to help break into United States government computers last year, five people familiar…
Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on US payroll agency – sources – CNA
WASHINGTON: Suspected Chinese hackers exploited a flaw in software made by SolarWinds to help break into US government computers last year, five people familiar with the…
Security firms find SolarWinds compromise. Biden scolds Putin. Sudo’s Baron Samedit bug. Europol downs Emotet. Fios is back up. – The CyberWire
The known extent of Solorigate continues to expand. Four security firms (Mimecast, Palo Alto Networks, Qualys, and Fidelis) have acknowledged that they had installed Trojanized…
Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day – Help Net Security
Here’s an overview of some of last week’s most interesting news and articles: Top videoconferencing attacks and security best practicesVideoconferencing has become a routine part…
Telegram or Signal? Welcome to the illusion called data security – National Herald
According to leading tech policy and media consultant Prasanto K. Roy, when WhatsApp discovered the Pegasus attack, it quickly fixed the vulnerability, informed users whom…
Bluetooth Spoofing Bug Affects Billions Of IoT Devices
The ‘BLESA’ flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.…
LastPass Fixes Bug That Leaks Credentials
LastPass has patched a bug that could potentially allow malicious websites to access a web user’s credentials from a previously visited site. Tavis Ormandy, a…
Cybersecurity careers: Which one is right for you? – We Live Security
Looking for vulnerabilities, securing systems or dismantling them, these are all viable career paths in the cybersecurity industry. Could one of them be right for…