- PostgreSQL databases on Linux systems are being targeted by cryptojacking attacks due to inadequate security.
- Cisco Talos has found vulnerabilities in Microsoft applications for macOS that could allow unauthorized access to microphones and cameras.
- Google has fixed a zero-day vulnerability in Chrome, CVE-2024-7971, which was being actively exploited.
- OpenCTI, an open-source cyber threat intelligence platform, has been launched to help organizations manage cyber threat data.
- A compilation of cybersecurity job openings indicates a growing demand for professionals in the field.
- A critical vulnerability in GitHub Enterprise Server, CVE-2024-6800, has been patched to prevent unauthorized access.
- SolarWinds has released a patch for a critical flaw in its Web Help Desk solution following a previous fix for a code-injection vulnerability.
- Hiya reported nearly 20 billion calls flagged as spam in the first half of 2024, with a rise in AI-driven scams.
- Microsoft will implement mandatory multi-factor authentication for all Azure sign-ins.
- North Korean hackers exploited a zero-day vulnerability in a Windows driver, CVE-2024-38193, to deploy a rootkit.
- NGate malware has been identified, which uses NFC technology to steal funds from victims' payment cards on Android devices.
- Many organizations face security vulnerabilities in APIs, particularly with exposed secrets.
- Microchip Technology Incorporated experienced operational disruptions due to a cyberattack.
- Experts are questioning the future of national data privacy legislation in the U.S. amid discussions on federal privacy laws.
- Research indicates that fraudsters can exploit digital wallet apps to use stolen payment cards even after they are reported compromised.
- x64dbg is gaining popularity among security professionals for malware analysis and reverse engineering.
- Current vulnerability management approaches focus on risk prioritization as a starting point for security strategy.
- Building a positive cybersecurity culture within organizations is essential for risk reduction and resilience.
- Higher education institutions are exploring ways to enhance cybersecurity measures despite resource constraints.
- A new phishing campaign targeting Android and iPhone users has been uncovered by ESET researchers.
- Organizations are recognizing the importance of managing enterprise data to improve cybersecurity, despite challenges from siloed systems.
- The federal government is focusing on food security as a critical infrastructure issue.
- Organizations are adopting biometric solutions to counter the risks posed by deepfake technology.
- New information security products have been released by companies including Entrust, Fortanix, McAfee, Own, RightCrowd, and Wallarm.