When CISA called on the world’s leading software manufacturers to sign its Secure by Design Pledge, Tenable answered promptly and enthusiastically, becoming part of the first wave of supporters of this landmark initiative. In this blog post, Tenable CSO, Head of Research and President of Public Sector Robert Huber explains the significance of this pledge…

Read More

Based on technology from its recent Talend and Kyndi acquisitions, Qlik this week launched a new platform with comprehensive data integration and management services and a new GenAI assistant for tapping into unstructured data. Data analytics and integration tech developer Qlik has launched the Qlik Talend Cloud, a new data management platform based on technology…

Read More

A new ransomware operation named ‘Fog’ launched in early May 2024, using compromised VPN credentials to breach the networks of educational organizations in the U.S. Fog was discovered by Arctic Wolf Labs, which reported that the ransomware operation has not set up an extortion portal yet and was not observed stealing data. However, BleepingComputer can…

Read More

Attackers are targeting GitHub repositories, wiping their contents, and asking the victims to reach out on Telegram for more information. These attacks are part of what looks like an ongoing campaign first spotted on Wednesday by Germán Fernández, a security researcher at Chilean cybersecurity company CronUp. The threat actor behind this campaign—who has the Gitloker…

Read More

The most likely way the FBI will associate specific keys with specific victims — assuming that particular victim contacts the authorities — is that “the FBI will generate a script that will run all 7,000-plus keys” against the victim’s still-locked files, Levine said. There’s also a possibility that LockBit was reusing keys, he said. A reason…

Read More

A report indicated that Advance Auto Parts is allegedly the latest victim in a wave of data theft attacks targeting Snowflake customers. Advance Auto Parts is reportedly the latest victim in a wave of data theft attacks targeting Snowflake customers, which are believed to be utilizing stolen passwords. Separately, a report from TechCrunch highlighted the…

Read More

Espionage with a Drone The US is using a World War II law that bans aircraft photography of military installations to charge someone with doing the same thing with a drone. Tags: drones, espionage, national security policy, photos Posted on June 6, 2024 at 11:51 AM • 0 Comments Sidebar photo of Bruce Schneier by…

Read More

Did your company fall victim to the LockBit ransomware? Have cybercriminals left gigabytes of your data encrypted, with no easy route for recovery that doesn’t involve paying a ransom?   Well, don’t fear. The FBI announced this week that it had obtained over 7,000 decryption keys for the LockBit ransomware and is urging victims to…

Read More

CISA released four Industrial Control Systems (ICS) advisories on June 6, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations. Source link lol

Read More

Chinese shopping platform Pandabuy told BleepingComputer it previously paid a ransom not to leak stolen data after the same threat actor began extorting the company again this week. PandaBuy is an online platform that acts as an intermediary between customers and various Chinese e-commerce websites, including Tmall, Taobao, and JD.com, which don’t ship internationally. The…

Read More