Category: Kamban

Multiple owners of Google Pixel 6 series phones (6, 6a, 6 Pro) have been reporting in the past week that their devices were “bricked” after they performed a factory reset. Factory resets wipe the device of all personal data, apps, and settings and are typically performed when the device owner prepares it for resale. The Pixel…

Read More

Google Chrome is set to prevent the use of SSL certificates issued by Entrust. Google Chrome specifically blocks SSL certificates issued by Entrust starting from November 2024. This news shows the importance of certificate security compliance and customers’ digital privacy, which a Certificate Authority must understand. Google announced that all SSL certificates from Entrust will…

Read More

Prudential Financial, a global financial services company, has revealed that over 2.5 million people had their personal information compromised in a February data breach. According to an 8-K form filed with the U.S. Securities and Exchange Commission, Prudential detected the incident on February 5, one day after the attackers (a suspected cybercrime group) breached its systems…

Read More

CDK Global says that its dealer management system (DMS), impacted by a massive IT outage following a June 18th ransomware attack, will be back online by Thursday for all car dealerships. The company is also working on restoring access to other affected applications, including its Customer Relationship Management (CRM), ONE-EIGHTY, and Service solutions. “We are…

Read More

An Australian man was charged by Australia’s Federal Police (AFP) for allegedly conducting an ‘evil twin’ WiFi attack on various domestic flights and airports in Perth, Melbourne, and Adelaide to steal other people’s email or social media credentials. The police started investigating reports from airline employees in April 2024 and found evidence of the man…

Read More

Modern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch Target Injection (BTI) attack dubbed ‘Indirector,’ which could be used to steal sensitive information from the CPU. Indirector exploits flaws in Indirect Branch Predictor (IBP) and Branch Target Buffer (BTB), two…

Read More

Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches. Cybersecurity firm Sygnia, who reported the incidents to Cisco, linked the attacks to a Chinese state-sponsored threat actor it tracks as Velvet Ant. “Sygnia detected this exploitation during a larger forensic investigation into the China-nexus cyberespionage group…

Read More

‘This funding is going to help us with our globalization strategy,’ says Tiffany Ricks, founder and CEO of HacWare. ‘Our goal is to leverage AI to make sure we take the guesswork out of training your employees on the evolving threats.’ Cybersecurity education firm HacWare Inc. is one of 20 Black- and Latino-led companies that…

Read More

A new OpenSSH unauthenticated remote code execution (RCE) vulnerability dubbed “regreSSHion” gives root privileges on glibc-based Linux systems. OpenSSH is a suite of networking utilities based on the Secure Shell (SSH) protocol. It is extensively used for secure remote login, remote server management and administration, and file transfers via SCP and SFTP. The flaw, discovered by researchers…

Read More

Understanding Data Privacy and Security: How do they Relate? Data privacy and security are critical topics for any business to focus on in today’s environment. The rising costs of cyberattacks and other threats mean a clear strategy for safeguarding sensitive data is more important than ever before. This is something no organization can afford to…

Read More