There’s a Bing ding dong, after Microsoft (over?) enthusiastically encourages Chrome users to stop using Google, and silence hits the British Library as it shares its story of a ransomware attack. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus:…
Read MoreWelcome to this week’s edition of the “Bi-Weekly Cyber Roundup” by Canary Trap. In the ever-changing realm of cybersecurity, staying informed is a challenging necessity. At Canary Trap, it is our mission to keep you up-to-date with the most critical developments in the world of cyber security and this bi-weekly publication is your gateway to…
Read MoreThe US Cybersecurity & Infrastructure Security Agency (CISA) released 15 advisories covering serious vulnerabilities in industrial control products from Siemens, Mitsubishi Electric, Delta Electronics, and Softing Industrial Automation. Some of the flaws are rated with high and critical severity and can result in remote code execution. Eleven of the 15 advisories cover vulnerabilities in Siemens…
Read MoreThe United States Federal Trade Commission (FTC) has warned the public to be cautious if contacted by people claiming to be… FTC staff. In a warning published on its website, the FTC said that scammers were using its employees’ real names to steal money from consumers. A typical ruse will see the bogus FTC staffer…
Read MoreMar 20, 2024NewsroomDoS Attack / Network Security A novel denial-of-service (DoS) attack vector has been found to target application-layer protocols based on User Datagram Protocol (UDP), putting hundreds of thousands of hosts likely at risk. Called Loop DoS attacks, the approach pairs “servers of these protocols in such a way that they communicate with each…
Read MoreThreats to the payment ecosystem in 2023 chiefly comprised of financial scams, with threat actors increasingly adopting AI technologies to stay at the top of their games, according to a VISA report. The top scams identified by the US-based payment card services operator included pig butchering, inheritance scams, humanitarian relief scams, and triangulation frauds. “The latest…
Read MoreAre you using the same passwords in multiple places online? Well, stop. Stop right now. And make sure that you’ve told your friends and family to stop being reckless too. Because if you use the same login credentials in different places online, you’re behaving in a very risky way. If a cybercriminal breaches a system…
Read MoreMultiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a Golang-based remote access trojan called Spark RAT. The attacks entail the exploitation of CVE-2024-27198 (CVSS score: 9.8) that enables an adversary to bypass authentication measures and gain administrative control over affected…
Read MoreMar 20, 2024The Hacker NewsArtificial intelligence / Webinar Did you know that 79% of organizations are already leveraging Generative AI technologies? Much like the internet defined the 90s and the cloud revolutionized the 2010s, we are now in the era of Large Language Models (LLMs) and Generative AI. The potential of Generative AI is immense,…
Read MoreCheating Automatic Toll Booths by Obscuring License Plates The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can’t identify them and charge tolls properly. Some drivers have power-washed paint off their plates or covered them with a range of household items…
Read More