Category: Kamban

Samsung has launched a new bug bounty program for its mobile devices with rewards of up to $1,000,000 for reports demonstrating critical attack scenarios. The new ‘Important Scenario Vulnerability Program (ISVP)’ program focuses on vulnerabilities related to arbitrary code execution, the unlocking of devices, data extraction, arbitrary application installation, and bypassing device protections. Highlighted payouts…

Read More

The Grand Palais Réunion des musées nationaux (Rmn) in France is warning that it suffered a cyberattack on Saturday night, August 3, 2024. Grand Palais Rmn is an institution responsible for managing several museums and cultural sites in France. It oversees various aspects of the museum’s operations, including exhibitions, cultural programming, and operations. The institute…

Read More

Proton VPN has announced a series of updates to its Windows and Android apps to help users combat censorship, circumvent blocks, and protect themselves from authoritarian governments due to using forbidden tools. One of the standout features is ‘Discreet Icon,’ a new setting allowing users to disguise the Proton VPN app icon and make it…

Read More

It’s a common story: weak or reused passwords find their way online, with damaging consequences for organization. Criminals increasingly deploy stolen credentials to gain initial access to user accounts, bringing new demands for security. This had led to a booming market for stolen credentials and the initial access they can bring. The ENISA Threat Landscape…

Read More

A hacker has breached Mobile Guardian, a digital classroom management platform used worldwide, and remotely wiped data from at least 13,000 student’s iPads and Chromebooks. Mobile Guardian, a ‘Google for Education’ partner, is a cross-platform (Android, Windows, iOS, ChromeOS, macOS) one-on-one solution for K-12 schools that offers a complete suite of device management, parental monitoring and…

Read More

Ransomware Response: Best Practices for Businesses Becoming the target of a ransomware attack is something no organization likes to think about, but it’s increasing likely for many firms. According to Statista, almost three-quarters of businesses (72.7 percent) were affected by ransomware last year. This means it’s essential for every company to make a ransomware response…

Read More

Image: MidjourneyAndroid security updates this month patch 46 vulnerabilities, including a high-severity remote code execution (RCE) exploited in targeted attacks. The zero-day, tracked as CVE-2024-36971, is a use after free (UAF) weakness in the Linux kernel’s network route management. It requires System execution privileges for successful exploitation and allows altering the behavior of certain network connections.…

Read More

‘There’s a limited amount I can say on this other than the headline facts. … I’m sure you appreciate there are some reasons why on that one. The one thing I would say though, is we’re 24,500 people at ServiceNow. CJ Desai was a very senior leader in this business, and we’re deeply grateful for…

Read More

The Hunters International ransomware group is targeting IT workers with a new C# remote access trojan (RAT) called SharpRhino to breach corporate networks. The malware helps Hunters International achieve initial infection, elevate their privileges on compromised systems, execute PowerShell commands, and eventually deploy the ransomware payload. Quorum Cyber researchers who discovered the new malware report…

Read More

​Microsoft has mitigated an Azure outage that lasted more than two hours and took down multiple services for customers across North and Latin America. The company says the incident started around 18:22 UTC and impacted services that leverage Azure Front Door (AFD), its modern cloud Content Delivery Network (CDN). “This issue is impacting multiple geographies,…

Read More