Sunday, January 22, 2023

The Ethics of Hiring Ethical Hackers: What to Consider

The field of ethical hacking is becoming increasingly important as organizations look to protect their networks and data from cyber threats. Ethical hackers, also known as white hat hackers, are hired by organizations to test, identify and fix vulnerabilities in their systems.

logo
Publisher: _____
Date: 2023-01-21T08:10:36 00:00
Author: Gary Davis
Twitter: @IntelligLiving
Reference: (Read more) Visit Source



Hackers now use Microsoft OneNote attachments to spread malware

However, in July, Microsoft finally disabled macros by default in Office documents, making this method unreliable for distributing malware.

Not to be deterred, threat actors quickly switched to using a new file format in their malicious spam (malspam) attachments: Microsoft OneNote attachments.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Google pays Indian hackers ₹18 lakh: Know here's why | Mint
Publisher: mint
Date: 2023-01-21T17:26:04 05:30
Twitter: @mint
Reference: (Read more) Visit Source



Shipmanagement software vendors targeted by hackers - Splash247

Shipmanagement software vendors have been warned to be on their guard with experts suggesting this maritime niche is becoming the focus of hackers.

“We’re watching this trend closely as it’s worrying there’s a number of attacks on shipping software in reasonably close succession," commented Daniel Ng, the CEO of CyberOwl, a UK-based cyber security firm.

logo
Publisher: Splash247
Date: 2023-01-20T07:45:24 00:00
Author: Sam Chambers
Twitter: @splash_247
Reference: (Read more) Visit Source



WATCH: Hackers 'making millions, and that's why they keep doing it' - Sudbury News

Sai Huda, a best-selling author and founder of the online security firm CyberCatch, was a recent guest on "Inside the Village," a news and current affairs podcast produced by Village Media.

Publisher: Sudbury.com
Twitter: @sudburydotcom
Reference: (Read more) Visit Source



Hackers Can Exploit GE Historian Vulnerabilities for ICS Espionage, Disruption | SecurityWeek.Com

Vulnerabilities found in GE's Proficy Historian product could be exploited by hackers for espionage and to cause damage and disruption in industrial environments.

The US Cybersecurity and Infrastructure Security Agency (CISA) informed organizations about these vulnerabilities on Tuesday, when industrial cybersecurity firm Claroty, whose researchers discovered the flaws, also released a blog post detailing the findings.

Reference: (Read more) Visit Source



Hackers are Using AI Tools such as ChatGPT for Malware Development

One of the biggest concerns is the use of AI tools to accelerate malware development. Researchers at IBM developed an AI-based tool to demonstrate the potential of AI to be used to power a new breed of malware.

logo
Publisher: HIPAA Journal
Date: 2023-01-20T14:08:03 00:00
Author: HIPAA Journal
Reference: (Read more) Visit Source



White hat hackers expose flaws in automakers' cybersecurity

Automotive News reports, white hat hackers broke into several automakers’ customer and back-end systems. Such as BNW, Ferrari, Ford, Jaguar-Land Rover, Mercedes-Benz, Porsche, and Rolls-Royce.

The finding is a follow-up to the group’s late-year revelation of SiriusXM’s telematics service vulnerabilities that led to breaches in Honda, Hyundai, Nissan, and Toyota model lines.

logo
Publisher: CBT Automotive Network
Date: 2023-01-18T10:01:17 00:00
Twitter: @CarBizToday
Reference: (Read more) Visit Source



T-Mobile says hackers stole data on 37M customers

Around 37 million T-Mobile customers recently had their personal information compromised when a hacker breached the wireless carrier's database.

In a filing with the Securities and Exchange Commission on Thursday, T-Mobile said the data breach happened in late November but was just discovered on January 5. Within a day, the company says it was able to trace the source of the "malicious activity" and stop the breach.

logo
Date: 2023-01-20T16:50:20.616 00:00
Author: Stephanie Raymond
Twitter: @audacy
Reference: (Read more) Visit Source






https://sypuber.page.link/reddcct

REDACTED ID. Click here.





No comments:

Post a Comment