Category: Kamban

In the modern cybersecurity landscape, biometric authentication emerges as a pivotal solution, offering multifaceted benefits in safeguarding data and systems. With its diverse applications, including facial recognition and behavioral analysis, it not only enhances user experience but also mitigates the risks associated with password reliance. Moreover, its robust security measures make it challenging for threat…

Read More

Daily newspaper Philadelphia Inquirer revealed that attackers behind a May 2023 security breach have stolen the personal and financial information of 25,549 individuals. The Inquirer is Philadelphia’s largest newspaper by circulation and has won 20 Pulitzer Prizes since it was founded in 1829. It’s also the third-longest operating daily newspaper in the United States. In…

Read More

A new vulnerability has been discovered in the R programming language that allows arbitrary code execution upon deserializing specially crafted RDS and RDX files. R is an open-source programming language that is particularly popular among statisticians and data miners who develop and use custom data analysis models, and it is also seeing increased adoption by the emerging AI/ML field.…

Read More

D&H is in the process of outfitting its 800 person sales/support team with AI PCs and rolling out a road show that aims to get 5,000 partners selling the new systems. D&H Distributing Co-President Dan Schwab said the distributor expects a “rolling thunder’ demand from partners for AI PCs. “The demand is a rolling thunder,”…

Read More

Google has increased rewards for reporting remote code execution vulnerabilities within select Android apps by ten times, from $30,000 to $300,000, with the maximum reward reaching $450,000 for exceptional quality reports. The company made these changes to the Mobile Vulnerability Rewards Program (Mobile VRP) and they apply to what it describes as Tier 1 applications.…

Read More

Perficient is considering a sale to another IT company or to private equity, according to Bloomberg which cited unnamed people familiar with the matter, but the company in the end could also pass on such a sale, Bloomberg reported. Global digital consulting company Perficient appears to be looking at a potential sale. Bloomberg, citing unnamed…

Read More

Three large-scale campaigns targeted Docker Hub users, planting millions of repositories that pushed malware and phishing sites since early 2021. As JFrog security researchers found, around 20% of the 15 million repositories hosted by Docker Hub contained malicious content, ranging from spam to dangerous malware and phishing sites.  The researchers discovered almost 4.6 million repositories containing no…

Read More

A new Android backdoor malware named ‘Wpeeper’ has been spotted in at least two unofficial app stores mimicking the Uptodown App Store, a popular third-party app store for Android devices with over 220 million downloads. Wpeeper stands out for its novel use of compromised WordPress sites to act as relays for its actual command and control (C2)…

Read More

UnitedHealth confirms that Change Healthcare’s network was breached by the BlackCat ransomware gang, who used stolen credentials to log into the company’s Citrix remote access service, which did not have multi-factor authentication enabled. This was revealed in UnitedHealth CEO Andrew Witty’s written testimony published ahead of a House Energy and Commerce subcommittee hearing scheduled for tomorrow. The ransomware attack on Change…

Read More

A new cluster of activity tracked as “Muddling Meerkat” is believed to be linked to a Chinese state-sponsored threat actor’s manipulation of DNS to probe networks globally since October 2019, with a spike in activity observed in September 2023. A notable aspect of Muddling Meerkat’s activity is the manipulation of MX (Mail Exchange) records by injecting…

Read More