Industry Spotlight
NSA Issues Guidance for Enterprises Adopting Zero Trust
The National Security Agency (NSA) wants organizations adopt zero-trust framework principles to protect their enterprise networks and is releasing guidance to help them get there. The agency is arguing that adopting controls ...
Security Boulevard
Healthcare Groups Push for Help in Wake of Ransomware Attack on Change
Healthcare providers groups are ramping up pressure on the federal government, lawmakers, and UnitedHealth Group to help hospitals, healthcare clinics, and pharmacies that have gone more than two weeks without payments following ...
Security Boulevard
Facebook/Insta FAIL — ‘Anonymous Sudan’ has a Super Tuesday: ‘We Did It.’
Richi Jennings | | Anonymous, Anonymous Hacking Collective, Anonymous Sudan, API Authentication, API Authentication Errors, API Authorization, Application DDoS, application-layer DDoS attacks, Cloud DDoS, cloud outage, ddos, DDoS attack, DDoS attacks, Downtime and outages, facebook, Facebook accounts, facebook breach, facebook instagram hack, facebook login, Facebook outage, Instagram, Instagram outage, instagram vulnerability, Internet outage, internet outages, InternetOutage, Meta, Meta Networks, outage, Outage Investigation, outages, SB Blogwatch, Storm-1359, Stupidity of Instagram, Threads
Shooper Choosday: Was yesterday’s Meta outage outrage caused by a Russian DDoS? ...
Security Boulevard
Self-Replicating AI Malware is Here😱 #ComPromptMized
Richi Jennings | | AI, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), Artificial Intelligence News, artificial intellignece, Artificial Stupidity, artificialintelligence, ComPromptMized, cybersecurity risks of generative ai, generative AI, Generative AI risks, Large Language Models (LLM), Large language models (LLMs), LLM, LLMs, Morris Worm, SB Blogwatch, worm, worm morris, WormGPT
Skrik: Researchers worm themselves into your nightmares ...
Security Boulevard
CISA Warns Phobos Ransomware Groups Attacking Critical Infrastructure
Phobos, a complex ransomware-as-a-service (RaaS) operation that has been around for five years and is includes multiple variants, continues to target a range of critical infrastructure in the United States, including education, ...
Security Boulevard
Cheap Video Doorbell Cams: Tools of Stalkers and Thieves
Richi Jennings | | Andoe, Anker, camera, camera hijacking, camera vulnerability, cameras, CCTV camera, CCTV cameras, Consumer IoT, Consumer Reports, Doorbell Camera, Eken, enshittification, Eufy, Fishbot, Gemee, hacked Wi-FI, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, internet-enabled cameras, iot, IoT camera, IoT security camera, IP surveillance cameras, ipcamera, Luckwolf, Rakeblue, Ring Camera, Ring Doorbell, safe wifi, SB Blogwatch, Sears, SHEIN, The ‘S’ in IoT stands for Security, Tuck, unsecure Wi-FI, Wi-Fi, Wi-Fi hacking, Wi-Fi networks, wi-fi security, Wyze
EKEN IoT FAIL: Amazon, Sears and Shein still sell security swerving stuff ...
Security Boulevard
Vishing, Smishing Thrive in Gap in Enterprise, CSP Security Views
There is a significant gap between enterprises’ high expectations that their communications service provider will provide the security needed to protect them against voice and messaging scams and the level of security ...
Security Boulevard
Security Vulnerabilities Popping Up on Hugging Face’s AI Platform
Hugging Face is emerging as a significant player in the rapidly expanding generative AI space, with its highly popular open collaboration platform being used by software developers to host machine learning models, ...
Security Boulevard
GitHub Fights Forks — Millions of Them — Huge Software Supply Chain Security FAIL
Richi Jennings | | Apiiro, App Sec & Supply Chain Security, AppSec & Supply Chain Security, dependency confusion, dependency confusion attacks, GitHub, github application security, github bug, GitHub Exploit, GitHub repositories, GitHub Security Measures, github security scanning, GitHub Security Vulnerabilities, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, repo confusion, SB Blogwatch, secure software supply chain, software supply chain, software supply chain attack, software supply chain attacks, software supply chain automation, software supply chain hygiene, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Weaknesses, supply chain, supply chain security, Supply-Chain Insecurity
Forking hell: Scrotebots clone thousands of projects, injecting malware millions of times ...
Security Boulevard
FBI Warns: Ubiquiti EdgeRouter is STILL Not Secure
Richi Jennings | | APT28, Botnet disruption, Botnet Takedown, botnets, CVE-2023-23397, EdgeRouter, Fancy Bear, FBI warning, GRU, IC3, IC3.gov, Military Unit 26165, nsa, NSA/CISA, NTLM, NTLM Authentication, NTLM hash, NTLM leak, ntlm relay, Russia, russia hacker, russia-based, russian, Russian Cyber Interests, Russian Cyber War, SB Blogwatch, Ubiquiti, Ubiquiti breach, Ubiquiti Inc., Ubiquiti Networks, US FBI
GRU APT28 is back again: Fancy Bear still hacking ubiquitous gear, despite patch availability ...
Security Boulevard