Security Challenges and Opportunities of Remote Work
Self-Replicating AI Malware is Here😱 #ComPromptMized
Richi Jennings | | AI, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), Artificial Intelligence News, artificial intellignece, Artificial Stupidity, artificialintelligence, ComPromptMized, cybersecurity risks of generative ai, generative AI, Generative AI risks, Large Language Models (LLM), Large language models (LLMs), LLM, LLMs, Morris Worm, SB Blogwatch, worm, worm morris, WormGPT
Skrik: Researchers worm themselves into your nightmares ...
Security Boulevard
Cheap Video Doorbell Cams: Tools of Stalkers and Thieves
Richi Jennings | | Andoe, Anker, camera, camera hijacking, camera vulnerability, cameras, CCTV camera, CCTV cameras, Consumer IoT, Consumer Reports, Doorbell Camera, Eken, enshittification, Eufy, Fishbot, Gemee, hacked Wi-FI, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, internet-enabled cameras, iot, IoT camera, IoT security camera, IP surveillance cameras, ipcamera, Luckwolf, Rakeblue, Ring Camera, Ring Doorbell, safe wifi, SB Blogwatch, Sears, SHEIN, The ‘S’ in IoT stands for Security, Tuck, unsecure Wi-FI, Wi-Fi, Wi-Fi hacking, Wi-Fi networks, wi-fi security, Wyze
EKEN IoT FAIL: Amazon, Sears and Shein still sell security swerving stuff ...
Security Boulevard
GitHub Fights Forks — Millions of Them — Huge Software Supply Chain Security FAIL
Richi Jennings | | Apiiro, App Sec & Supply Chain Security, AppSec & Supply Chain Security, dependency confusion, dependency confusion attacks, GitHub, github application security, github bug, GitHub Exploit, GitHub repositories, GitHub Security Measures, github security scanning, GitHub Security Vulnerabilities, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, repo confusion, SB Blogwatch, secure software supply chain, software supply chain, software supply chain attack, software supply chain attacks, software supply chain automation, software supply chain hygiene, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Weaknesses, supply chain, supply chain security, Supply-Chain Insecurity
Forking hell: Scrotebots clone thousands of projects, injecting malware millions of times ...
Security Boulevard
FBI Warns: Ubiquiti EdgeRouter is STILL Not Secure
Richi Jennings | | APT28, Botnet disruption, Botnet Takedown, botnets, CVE-2023-23397, EdgeRouter, Fancy Bear, FBI warning, GRU, IC3, IC3.gov, Military Unit 26165, nsa, NSA/CISA, NTLM, NTLM Authentication, NTLM hash, NTLM leak, ntlm relay, Russia, russia hacker, russia-based, russian, Russian Cyber Interests, Russian Cyber War, SB Blogwatch, Ubiquiti, Ubiquiti breach, Ubiquiti Inc., Ubiquiti Networks, US FBI
GRU APT28 is back again: Fancy Bear still hacking ubiquitous gear, despite patch availability ...
Security Boulevard
PRC State Hacking: ‘Chinese Edward Snowden’ Spills I‑Soon Secrets in Huge Dump of TTPs
Richi Jennings | | APT41, Auxun, Chengdu 404, china, china espionage, Chinese, Chinese Communists, Chinese devices, chinese government, chinese hacker, Chinese hackers, Chinese Threat Actors, Data Stolen By China, Great Firewall of China, hong kong, i-soon, Insider, insider breach, insider risk, iSoon, Peoples Republic of China, SB Blogwatch, Tibet, Uyghur
Underpaid, overworked and angry: Whistleblower in hacker contractor firm for Chinese government blows lid off tactics, techniques and procedures ...
Security Boulevard
‘PrintListener’ Attack on Fingerprint Readers — Can You Trust Biometrics?🤞
Richi Jennings | | biometric, biometric authentication, biometric data, Biometric Data Abuse, biometric identification, biometric identity, biometric security, biometrics, biometrics authentication, Biometrics-Based Authentication, digital biometrics, digital fingerprint, Fingerprint Scanners, fingerprint scanning, Fingerprint Sensor Vulnerabilities, fingerprint sensors, fingerprints, PrintListener, SB Blogwatch, Side-Channel, side-channel attack, side-channel attacks, sidechannelattacks, touchless fingerprint
Mic Check: Researchers reconstruct your fingerprint by listening to you swipe ...
Security Boulevard
LockBit Takedown by Brits — Time for ‘Operation Cronos’
Richi Jennings | | British, British intelligence, Infrastructure Takedown, Lockbit, LockBit ransomware, National Crime Agency, network takedown, Operation Cronos, SB Blogwatch, takedown, takedowns, U.K. National Crime Agency, uk, website takedown, website takedowns
RaaS nicked: 11-nation army led by UK eliminates ransomware-for-hire scrotes’ servers ...
Security Boulevard
‘Incompetent’ FCC Fiddles With Data Breach Rules
Richi Jennings | | breach notification, Data Breach Notification, data breach notification laws, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, GDPR Breach Notification, Jessica Rosenworcel, SB Blogwatch, U.S. Federal Communications Commission
FCC FAIL: While Rome burns, Federal Communications Commission is once again behind the curve ...
Security Boulevard
Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi
Richi Jennings | | BIOS, CVE-2023-40547, Enterprise Linux and Open Source, Linux, open source, Open Source and Software Supply Chain Risks, open source code, Open Source Community, open source components, open source development, Open Source Ecosystem, SB Blogwatch, secure boot, shim, UEFI, UEFI Failing, UEFI vulnerabilities
Snow joke: A Microsoft researcher found it—and it’s somehow Microsoft’s fault ...
Security Boulevard
CFO Deepfake Fools Staff — Fakers Steal $26M via Video
Richi Jennings | | Deep Fake, deepfake, deepfake attacks, Deepfake Satire, Deepfake security threats, Deepfake Technology, deepfake videos, hong kong, SB Blogwatch, Taylor Swift
Bad hoax blood: Spearphish pivots to deepfake Zoom call, leads to swift exit of cash ...
Security Boulevard