Jun 06, 2024The Hacker NewsPassword Security / Dark Web Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for his social media accounts and on his personal devices too. Unbeknownst to Tom, one of these…
Read MoreJun 06, 2024NewsroomData Encryption / Privacy Google has announced plans to store Maps Timeline data locally on users’ devices instead of their Google account effective December 1, 2024. The changes were originally announced by the tech giant in December 2023, alongside changes to the auto-delete control when enabling Location History by setting it to three…
Read MoreJun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in question is crytic-compilers, a typosquatted version of a legitimate library named crytic-compile. The rogue package was downloaded 441…
Read MoreBut that’s not what has some in the security industry concerned. Additional software called Recall will take snapshots and images and store them locally on the device so that you can review and roll back to remind yourself of what file, website, or app you were using in the past. The Recall feature introduces some…
Read MoreCircana’s Mike Crosby shares insight on channel trends in the education market, including the opportunities around AI in higher education and the potential rise of device as a service. Jennifer Follett, Executive Editor, CRN: This is Jennifer Follett with CRN, and I’m here with Mike Crosby of Circana. Mike, thanks so much for joining me.…
Read MoreThe new Built on Workday program offers the cloud software company’s ISV and development partners the opportunity to more widely sell through the Workday marketplace the applications and add-on software they build for the Workday platform. Cloud software provider Workday has launched a program to help ISV and software development partners market and sell applications…
Read MoreResearchers observed a new Linux variant of the TargetCompany ransomware family that targets VMware ESXi environments using a custom shell script to deliver and execute payloads. Also known as Mallox, FARGO, and Tohnichi, the TargetCompany ransomware operation emerged in June 2021 and has been focusing on database attacks (MySQL, Oracle, SQL Server) against organizations mostly in Taiwan, South Korea,…
Read MoreThe FBI urges past victims of LockBit ransomware attacks to come forward after revealing that it has obtained over 7,000 LockBit decryption keys that they can use to recover encrypted data for free. FBI Cyber Division Assistant Director Bryan Vorndran announced this on Wednesday at the 2024 Boston Conference on Cyber Security. “From our ongoing…
Read MoreGoogle shared details on a recently introduced Chrome feature that changes how cookies are requested, with early tests showing increased performance across all platforms. In the past, single-process browsers managed cookies easily because the data was kept in memory. However, modern browsers like Chrome use multiple processes to improve performance and security. Chrome runs a new…
Read More“The threat actors leveraged many novel evasion techniques, such as overwriting ntdll.dll in memory to unhook the Sophos AV agent process from the kernel, abusing AV software for sideloading, and using various techniques to test the most efficient and evasive methods of executing their payloads,” the researchers said. The attackers used several malware payloads that…
Read More