Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars: A researcher has found a new way to hack and steal Teslas, via a Bluetooth-based relay attack that abuses a key card feature. Read More New Speculative Execution Attack Against Apple M1 Chips: MIT researchers present PACMAN, a new speculative execution attack that bypasses the software security primitive called pointer authentication on Apple’s M1 processor. Read More Researchers: Wi-Fi Probe Requests Expose User Data: Academics discover that mobile devices leak identifying information about their owners via Wi-Fi probe requests. Read More Drupal Patches 'High-Risk' Third-Party Library Flaws: A pair of high-risk flaws in a third-party library exposes Drupal-powered websites to remote takeover attacks. Read More HYCU Raises $53 Million for Data Backup Technology: Backup-as-a-service firm HYCU has raised $53 million in a Series B funding round led by Acrew Capital. Read More Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign: Researchers analyze SeaFlower, an activity cluster linked to China that involves adding backdoors to popular iOS and Android Web3 wallets. Read More Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability: Multiple cybercrime and state-sponsored threat groups are exploiting the recently patched Confluence Server vulnerability tracked as CVE-2022-26134. Read More Cybersecurity Courses Ramp Up Amid Shortage of Professionals: Cybersecurity training grounds are popping up for students, recent grads and people who don’t even attend the college but are interested in cybersecurity careers. Read More Billion-Dollar Valuations Can't Halt Layoffs at OneTrust, Cybereason: Despite soaring valuations, several well-capitalized cybersecurity startups with 'unicorn' valuations are cutting staff to weather macroeconomic storms. Read More 38 Tech Leaders Sign Cyber Resilience Pledge: In partnership with Coalition to Reduce Cyber Risk (CR2), 37 organizations in eight countries have signed a pledge to improve cyber resilience against ransomware and other threats. Read More Vulnerabilities in HID Mercury Access Controllers Allow Hackers to Unlock Doors: Access control products from LenelS2 and other vendors using HID Mercury controllers are affected by vulnerabilities that can allow hackers to remotely unlock doors. Read More Chinese Cyberspy Group 'Aoqin Dragon' Targeting Southeast Asia, Australia Since 2013: SentinelOne details the MO of a Chinese cyberespionage group actively targeting education, government, and telecommunication organizations since at least 2013. Read More |
Comments
Post a Comment
Please leave a comment about our recent post.