Cybersecurity
-
Red Hat Faces Extortion Following Data Breach by ShinyHunters
Source: BleepingComputerRead more: Red Hat Faces Extortion Following Data Breach by ShinyHuntersRed Hat, a leading enterprise software company, is being extorted by the ShinyHunters hacking group. The group leaked samples of…
-
AWS IAM Identity Center Now Supports Customer-Managed KMS Keys for Encryption at Rest
Source: AWS BlogRead more: AWS IAM Identity Center Now Supports Customer-Managed KMS Keys for Encryption at RestAWS IAM Identity Center allows customers to use their own AWS KMS customer-managed keys (CMKs) to encrypt identity data at…
-
House Democrats Request Information on ICE Spyware Contract Over Privacy Concerns
Source: CyberScoopRead more: House Democrats Request Information on ICE Spyware Contract Over Privacy ConcernsThree House Democrats questioned the Department of Homeland Security about a $2 million contract between ICE and Israeli spyware maker…
-
Proposed EU ‘Chat Control’ Law Raises Privacy and Encryption Concerns
Source: CyberScoopRead more: Proposed EU ‘Chat Control’ Law Raises Privacy and Encryption ConcernsThe EU plans to vote on a law enabling mass scanning of personal messages to combat illegal content, which could…
-
Storm-1175 Exploits Critical GoAnywhere MFT Vulnerability in Ongoing Medusa Ransomware Attacks
Source: BleepingComputerRead more: Storm-1175 Exploits Critical GoAnywhere MFT Vulnerability in Ongoing Medusa Ransomware AttacksThe cybercrime group Storm-1175 has been exploiting a critical GoAnywhere MFT vulnerability in Medusa ransomware attacks for nearly a month.…
-
Microsoft Investigates Copilot Issues When Multiple Office Apps Run Simultaneously
Source: BleepingComputerRead more: Microsoft Investigates Copilot Issues When Multiple Office Apps Run SimultaneouslyMicrosoft is currently investigating a bug that affects its Copilot feature when multiple Office applications are open at the same…
-
Zeroday Cloud Hacking Competition Offers $4.5 Million in Bug Bounties for Cloud and AI Security Flaws
Source: BleepingComputerRead more: Zeroday Cloud Hacking Competition Offers $4.5 Million in Bug Bounties for Cloud and AI Security FlawsThe Zeroday Cloud hacking contest focuses on discovering vulnerabilities in open-source cloud and AI tools, offering a total prize pool…
-
Clop Ransomware Exploits New Oracle E-Business Suite Zero-Day Vulnerability
Source: Dark ReadingRead more: Clop Ransomware Exploits New Oracle E-Business Suite Zero-Day VulnerabilityThe Clop ransomware group has exploited a recently disclosed zero-day flaw to target Oracle E-Business Suite customers broadly. This attack…
-
Redis Releases Patches for Critical Remote Code Execution Vulnerability
Source: BleepingComputerRead more: Redis Releases Patches for Critical Remote Code Execution VulnerabilityThe Redis security team has addressed a maximum severity vulnerability that allows attackers to execute remote code on thousands of…
-
Deliveroo Enhances Merchant Partnerships Via Amazon Business Collaboration
Source: CIO MagazineRead more: Deliveroo Enhances Merchant Partnerships Via Amazon Business CollaborationDeliveroo expanded its partnership with Amazon Business to support merchants with purchasing power and operational efficiency. Key benefits include next-day…









