Sat.Mar 02, 2024

article thumbnail

US cyber and law enforcement agencies warn of Phobos ransomware attacks

Security Affairs

US CISA, the FBI, and MS-ISAC issued a joint CSA to warn of attacks involving Phobos ransomware variants observed as recently as February 2024 US CISA, the FBI, and MS-ISAC issued a joint cyber security advisory (CSA) to warn of attacks involving Phobos ransomware variants such as Backmydata , Devos, Eight, Elking, and Faust. The attacks were observed as recently as February 2024, they targeted government, education, emergency services, healthcare, and other critical infrastructure sectors.

article thumbnail

The Privacy Danger Lurking in Push Notifications

WIRED Threat Level

Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code of its Pegasus spyware, and an investigation finds widely available security cams are wildly insecure.

Privacy 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp

Security Affairs

A U.S. Court ordered surveillance firm NSO Group to hand over the source code for its Pegasus spyware and other products to Meta. Meta won the litigation against the Israeli spyware vendor NSO Group , a U.S. Judge ordered the surveillance firm to hand over the source code for its Pegasus spyware and other products to the social network giant. NSO Group has been requested to provide details regarding the complete functionality of the pertinent spyware, covering the period one year before the all

IT 143
article thumbnail

Weekly Update 389

Troy Hunt

How on earth are we still here? You know, that place where breached companies stand up and go all Iraqi information minister on the incident as if somehow, flatly denying the blatantly obvious will make it all go away. It's the ease of debunking the "no breach here" claim that I find particularly fascinating; the truth is always sitting there in the data and it doesn't take much to bring it to the surface.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.S. authorities charged an Iranian national for long-running hacking campaign

Security Affairs

The U.S. DoJ charged Iranian national Alireza Shafie Nasab for his role in attacks targeting U.S. government and defense entities. The U.S. Department of Justice (DoJ) charged Iranian national Alireza Shafie Nasab (39) for multi-year hacking campaign targeting U.S. defense contractors and private companies. Targeted entities include the U.S. Departments of the Treasury and State, defense contractors, and more than a dozen US companies, including firms based in New York.

Phishing 136
article thumbnail

Spinning Gold From Dull Yarns?—?A Peak Into The Darker Side of Beverly Hills

Information Governance Perspectives

Spinning Gold From Dull Yarns — A Peak Into The Darker Side of Beverly Hills [link] I nervously enrolled at the legendary Beverly Hills High School in September 1990—the same lousy year 90210 debuted on Fox. The primetime soap was widely popular among my classmates, but I always felt embarrassed by its outlandish depiction of our formative years. Incidentally, our old, spooky house on Beverly Drive had once been home to the show’s creator, Aaron Spelling.