Cybersecurity
-
Lapsus$ Threatens to Release Stolen Salesforce Customer Data
Source: Dark ReadingRead more: Lapsus$ Threatens to Release Stolen Salesforce Customer DataThe Lapsus$ cybercriminal group, after previously stating it would disband, has resurfaced with a new threat to release stolen Salesforce…
-
Israeli-backed AI-driven disinformation campaign targets Iran amid military conflict
Source: CyberScoopRead more: Israeli-backed AI-driven disinformation campaign targets Iran amid military conflictResearchers at Citizen Lab uncovered a coordinated Israeli-backed influence campaign on social media, employing AI-generated videos and imagery to spread…
-
Signal Introduces Sparse Post-Quantum Ratchet to Counter Quantum Computing Threats
Source: BleepingComputerRead more: Signal Introduces Sparse Post-Quantum Ratchet to Counter Quantum Computing ThreatsSignal has introduced the Sparse Post-Quantum Ratchet (SPQR), a new cryptographic mechanism aimed at enhancing security against quantum computing attacks.…
-
Renault and Dacia UK Notify Customers of Data Breach Impacting Sensitive Information
Source: BleepingComputerRead more: Renault and Dacia UK Notify Customers of Data Breach Impacting Sensitive InformationRenault and Dacia customers in the UK were informed about a data breach at a third-party provider that compromised sensitive…
-
Asahi Confirms Ransomware Attack Caused IT Disruptions and Factory Shutdowns
Source: BleepingComputerRead more: Asahi Confirms Ransomware Attack Caused IT Disruptions and Factory ShutdownsJapanese beer giant Asahi disclosed a ransomware attack that disrupted IT systems and forced factory shutdowns. The incident highlights cybersecurity…
-
ShinyHunters leak stolen data from Salesforce breaches to extort companies
Source: BleepingComputerRead more: ShinyHunters leak stolen data from Salesforce breaches to extort companiesShinyHunters extortion group has launched a data leak site targeting companies affected by Salesforce breaches. They publicly released samples of…
-
CometJacking Attack Exploits URL Parameters to Steal Emails via Comet AI Browser
Source: BleepingComputerRead more: CometJacking Attack Exploits URL Parameters to Steal Emails via Comet AI BrowserThe CometJacking attack exploits URL parameters in the Comet AI browser to execute hidden instructions, granting access to sensitive user…
-
In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach
Source: SecurityWeekRead more: In Other News: PQC Adoption, New Android Spyware, FEMA Data BreachRecent developments include the adoption of post-quantum cryptography (PQC), a new Android spyware threat, and a data breach involving FEMA.…
-
Free Template Helps CISOs Present AI Risks and Governance to Boards
Source: BleepingComputerRead more: Free Template Helps CISOs Present AI Risks and Governance to BoardsKeep Aware has released a free template designed to assist Chief Information Security Officers (CISOs) in effectively communicating generative AI…
-
Jaguar Land Rover Faces High Costs Due to Incomplete Ransomware Breach Cleanup
Source: Dark ReadingRead more: Jaguar Land Rover Faces High Costs Due to Incomplete Ransomware Breach CleanupJaguar Land Rover suffered significant financial and operational impacts after failing to fully remove attackers from a previous ransomware breach.…






