The Federal Communications Commission (FCC) has updated its data breach rules for the first time in 16 years. The new rules expand the definition of a breach and specify who should be notified.
Karakurt uses various tactics to steal data and extort victims for ransom. They contact victims’ employees, business partners, and clients to pressure them into paying the ransom.
Wyoming LLCs are being implicated in high-profile hacking activities, attracting cybercriminals due to the state’s easy registration process for anonymous shell companies.
MITRE has launched EMB3D, a new threat model framework to help defenders protect operational technology and industrial control systems by mapping cyber threats with vulnerabilities and flaws.
The hackers accessed an off-site data center used for human resources services, compromising personal information such as names, social security numbers, salary details, and banking information.
Google is using Clang sanitizers to enhance the security of the cellular baseband in Android. The sanitizers, including IntSan and BoundSan, detect and prevent vulnerabilities in program execution.
Saudi Arabian students specializing in AI and cybersecurity are participating in workshops to enhance their capabilities in identifying and assessing potential risks of large language models (LLMs) across different platforms.
The cybercrime group, Storm-1152, provided accounts to other cybercriminals involved in ransomware attacks and data theft, highlighting the interconnectedness of various criminal networks.
Sony’s subsidiary, Insomniac Games, is currently investigating a reported ransomware attack by the Rhysida gang, which has targeted various government institutions and healthcare organizations in the past.
The proposed eIDAS 2.0 bill in the European Union threatens online privacy and security by revoking web browsers’ ability to independently test the authenticity and trustworthiness of certificate authorities.