A large-scale malicious operation named “EmeraldWhale” scanned for exposed Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories. According to Sysdig, who discovered the campaign, the operation involves using automated tools that scan IP ranges for exposed Git configuration files, which may include authentication tokens. These tokens are then used to…
Read MoreChange Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information. Image: Tamer Tuncay, Shutterstock.com. A ransomware attack at Change Healthcare in the third week of February…
Read MoreThe Federal Bureau of Investigation (FBI) is warning of multiple schemes taking advantage of the upcoming U.S. general election to scam people out of their money or personal data. The fraudsters exploit the elevated legitimate activity surrounding the elections to scam people by impersonating real candidates and political movements. In most cases, the goal of…
Read MoreThird-quarter revenue for Google Cloud climbed 35 percent from a year ago and ‘the overall opportunity is increasing as customers embrace GenAI,’ Google CEO Sundar Pichai said during the company’s quarterly call Tuesday. Google Cloud’s aggressive investments into enabling the adoption of AI infrastructure and GenAI capabilities are paying off as the tech giant is…
Read MoreIn today’s digital landscape, businesses that handle sensitive data or provide critical services to other organizations face increasing scrutiny regarding their security and operational practices. A SOC audit is one of the most important ways to demonstrate the robustness of these practices. But what exactly is a SOC audit, and how can your organization prepare…
Read MoreOct 30, 2024The Hacker NewsVulnerability / Compliance Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements…
Read MoreOct 30, 2024Ravie LakshmananCybercrim / Cryptocurrency Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims’ crypto wallets. The package, named “CryptoAITools,” is said to have been distributed via both Python Package Index (PyPI) and bogus…
Read MoreIn a shocking cyber revelation, Chinese hackers are suspected of targeting cellphones belonging to former President Donald Trump and his 2024 running mate, Senator JD Vance. According to informed sources, the Trump/Vance campaign was alerted that both Trump and Vance may be among several individuals whose phone numbers were allegedly compromised. As the cybersecurity community…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-121 DATE(S) ISSUED: 10/27/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-122 DATE(S) ISSUED: 10/29/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Siemens InterMesh Subscriber Devices, the most severe of which could allow for remote code execution. InterMesh leverages mesh radio technology and hardened alarm monitoring panels to create a private, self-healing network that delivers alarm signals. Successful exploitation of the most severe…
Read More