The field of ethical hacking is becoming increasingly important as organizations look to protect their networks and data from cyber threats. Ethical hackers, also known as white hat hackers, are hired by organizations to test, identify and fix vulnerabilities in their systems.
Hackers now use Microsoft OneNote attachments to spread malware
However, in July, Microsoft finally disabled macros by default in Office documents, making this method unreliable for distributing malware.
Not to be deterred, threat actors quickly switched to using a new file format in their malicious spam (malspam) attachments: Microsoft OneNote attachments.
Google pays Indian hackers ₹18 lakh: Know here's why | Mint
Shipmanagement software vendors targeted by hackers - Splash247
Shipmanagement software vendors have been warned to be on their guard with experts suggesting this maritime niche is becoming the focus of hackers.
“We’re watching this trend closely as it’s worrying there’s a number of attacks on shipping software in reasonably close succession," commented Daniel Ng, the CEO of CyberOwl, a UK-based cyber security firm.
WATCH: Hackers 'making millions, and that's why they keep doing it' - Sudbury News
Sai Huda, a best-selling author and founder of the online security firm CyberCatch, was a recent guest on "Inside the Village," a news and current affairs podcast produced by Village Media.
Hackers Can Exploit GE Historian Vulnerabilities for ICS Espionage, Disruption | SecurityWeek.Com
Vulnerabilities found in GE's Proficy Historian product could be exploited by hackers for espionage and to cause damage and disruption in industrial environments.
The US Cybersecurity and Infrastructure Security Agency (CISA) informed organizations about these vulnerabilities on Tuesday, when industrial cybersecurity firm Claroty, whose researchers discovered the flaws, also released a blog post detailing the findings.
Hackers are Using AI Tools such as ChatGPT for Malware Development
One of the biggest concerns is the use of AI tools to accelerate malware development. Researchers at IBM developed an AI-based tool to demonstrate the potential of AI to be used to power a new breed of malware.
White hat hackers expose flaws in automakers' cybersecurity
Automotive News reports, white hat hackers broke into several automakers’ customer and back-end systems. Such as BNW, Ferrari, Ford, Jaguar-Land Rover, Mercedes-Benz, Porsche, and Rolls-Royce.
The finding is a follow-up to the group’s late-year revelation of SiriusXM’s telematics service vulnerabilities that led to breaches in Honda, Hyundai, Nissan, and Toyota model lines.
T-Mobile says hackers stole data on 37M customers
Around 37 million T-Mobile customers recently had their personal information compromised when a hacker breached the wireless carrier's database.
In a filing with the Securities and Exchange Commission on Thursday, T-Mobile said the data breach happened in late November but was just discovered on January 5. Within a day, the company says it was able to trace the source of the "malicious activity" and stop the breach.
We uncovered details of Ryan Zinke's misuse of official travel, expansive office renovations at taxpayer expense, q… https://t.co/XsluI3tM2t weareoversight Sun Jan 15 23:10:09 +0000 2023
https://sypuber.page.link/reddcct
REDACTED ID. Click here.
No comments:
Post a Comment