Tag: computer
-
Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers
by
in SecurityNewsThe National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on leaked documents circulating on social media have revealed that much of the information is false, inaccurate, or incomplete. Officials state these documents originated from a cyber attack targeting the organization’s computer systems. The CNSS has activated security protocols, launched an internal…
-
Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications
by
in SecurityNewsThe emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about MCP. Background Tenable Research has compiled this blog…
-
Russian Shuckworm APT is back with updated GammaSteel malware
by
in SecurityNewsfiles.lnk, launched from an external drive. This was recorded under the UserAssist key in the Registry, which stores a record of files, links, applications, and objects accessed by the current user through Windows Explorer.After that file was executed, it launched mshta.exe, a Windows binary that can be used to execute VBScript and JScript locally on…
-
Why Codefinger represents a new stage in the evolution of ransomware
by
in SecurityNews
Tags: access, advisory, attack, backup, best-practice, breach, business, cisco, cloud, computer, credentials, cybersecurity, data, defense, exploit, malicious, network, password, ransom, ransomware, risk, strategy, technology, threat, vmwareA new type of ransomware attack: The fundamentals of the Codefinger attack are the same as those in most ransomware attacks: The bad guys encrypted victims’ data and demanded payment to restore it.However, several aspects of the breach make it stand out from most other ransomware incidents:Attack vector: In traditional ransomware attacks, the attack vector…
-
Windows-Gefahren: Vergangenheit, Gegenwart und Zukunft
by
in SecurityNewsMobile Malware befindet sich auf dem Vormarsch, doch die fragmentierte Marktsituation erschwert den Cyberkriminellen ihre Arbeit ganz im Gegensatz zu der Welt der Desktops und Laptops: Laut Net Marketshare laufen seit letztem Monat 90 Prozent der Computer unter einer Windows-Version. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/05/19/windows-gefahren-vergangenheit-gegenwart-und-zukunft/
-
Infografik: Alternativen zu Passwörtern
by
in SecurityNewsDas Passwort ist ein stetiger Begleiter in unserem Computer-Alltag. Ob bei der Anmeldung zu unserem Benutzerkonto auf dem PC, beim Onlinebanking oder im Unternehmen überall erhalten wir den Zugang über ein Passwort. Doch seit einigen Jahren gerät diese Authentifizierungsmethode mehr und mehr in Verruf, ein Einfallstor für böswillige Hacker zu sein. First seen on welivesecurity.com…
-
Post-Quantum Cryptography: Preparing for a Quantum Future
by
in SecurityNewsAs quantum computing continues to evolve, the security of our digital infrastructure is under increasing scrutiny. While quantum computers promise groundbreaking advancements, they also pose a significant threat to the cryptographic algorithms that protect sensitive information across the internet. Enter Post-Quantum Cryptography (PQC) which is our path to quantum safe security. In this blog, we’ll……
-
Spionage-Ring Sednit greift isolierte Netzwerke an
by
in SecurityNewsDer Spionage-Ring Sednit, auch bekannt als Sofacy-Gruppe, APT28 oder ‘Fancy Bear”, treibt schon seit einiger Zeit sein Unwesen und hat bereits eine Vielzahl an Institutionen angegriffen. Vor kurzem haben wir einen Angriff entdeckt, im Zuge dessen die Gruppe physikalisch isolierte Computer-Netzwerke angreift, um mithilfe von Wechseldatenträgern sensible Dateien abzugreifen. First seen on welivesecurity.com Jump to…
-
WK Kellogg informiert über Datendiebstahl
by
in SecurityNewsDer für seine Cornflakes bekannte Lebensmittelkonzern WK Kellogg wurde um Daten beraubt.WK Kellogg, bekannt für seine Frühstücksprodukte wie Cornflakes und Frosties, teilte kürzlich mit, dass bei einem Angriff im Jahr 2024 Unternehmensdaten gestohlen wurden. In einer Mitteilung an die zuständigen Behörden heißt es, dass zu den offengelegten Daten auch Namen und Sozialversicherungsnummern gehören. Nach eigenen…
-
Botnet-Malware: Was steckt dahinter und wie schütze ich mich?
by
in SecurityNewsMalware oder schadhafter Code ist schon seit mehr als 40 Jahren in irgendeiner Form im Umlauf. Aber ein Einsatz von Malware zur Fernsteuerung verschiedener Computer, die als ein sogenanntes Botnet organisiert sind, ist ein Phänomen des 21. Jahrhunderts. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2014/10/24/botnet-malware-was-steckt-dahinter-wie-schutze-ich-mich/
-
Millionen Computer durch BIOS-Schwachstelle gefährdet
by
in SecurityNewsAuf der CanSecWest-Konferenz in Vancouver, Kanada, haben zwei Sicherheitsforscher in ihrem Vortrag ‘How Many Million BIOSes Would You Like To Infect?” vor Schwachstellen im BIOS vieler Computer gewarnt. Die gefundenen Sicherheitslücken ermöglichen Hackern offenabr relativ leicht, Angriffe auszuführen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/03/24/millionen-computer-durch-bios-schwachstelle-gefaehrdet/
-
Tech experts recommend full steam ahead on US export controls for AI
by
in SecurityNewsWhile the efficiency of newer Chinese models like DeepSeek have rumbled U.S. AI markets, experts say previous restrictions on the sale of computer chips and other important components are having an impact. First seen on cyberscoop.com Jump to article: cyberscoop.com/china-deepseek-export-controls-congress-i/
-
Lawsuit: Hospital Pharmacist Spied on Coworkers for a Decade
by
in SecurityNewsUniversity of Maryland Medical Center Said FBI Is Also Investigating Case. An academic medical center is facing a class action lawsuit alleging one of its pharmacists installed keylogging software on 400 computers over a decade to spy on the personal lives and intimate moments of coworkers. The pharmacist is also facing a criminal investigation, the…
-
Fake Microsoft Office add-in tools push malware via SourceForge
Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims’ computers to both mine and steal cryptocurrency. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/
-
Pharmacist accused of compromising computers to spy on colleagues
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/pharmacist-accused-of-compromising-computers-to-spy-on-colleagues
-
Beyond Bits and Bytes: How Quantum AI Could Solve Humanity’s Biggest Problems
by
in SecurityNews1. The Dead Weight of Classical Thinking Classical computers were never built to understand the world”, they were built to count. And they’ve done it well. Transistors, logic gates, memory”, all sharp-edged tools in a tidy box. But humanity’s problems aren’t tidy. Climate chaos, drug discovery, supply chains knotted like pub brawls”, all a bit…
-
Ransomware-Attacke auf Europcar
by
in SecurityNews
Tags: access, android, backup, cloud, computer, cyberattack, dark-web, gitlab, hacker, infrastructure, mail, ransomwareEuropcar hat einen Cyberangriff mit Datendiebstahl erlitten.Im Darknet sind kürzlich Hinweise auf einen Cyberangriff bei Europcar aufgetaucht, bei dem Kundendaten und andere vertrauliche Informationen entwendet wurden. Wie aus einem Bericht von Bleeping Computer hervorgeht, ist der Angreifer in die Gitlab-Repositories des Fahrzeugvermieters eingedrungen und hat Daten von 200.000 Kunden und den Quellcode für Android- und…
-
UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
by
in SecurityNewsThe Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware.The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine’s eastern border, the agency said.The attacks involve distributing phishing emails First seen on thehackernews.com Jump…
-
Credential Dumping: GMSA
by
in SecurityNewsReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group Managed Service Accounts (gMSA) to retrieve their passwords. In Active Directory, only specific computers or First seen on hackingarticles.in Jump to article: www.hackingarticles.in/credential-dumping-gmsa/
-
Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges
by
in SecurityNewsA Maryland pharmacist installed spyware on hundreds of computers at a major teaching hospital and recorded videos of staff over the course of a decade, a class-action lawsuit alleges. First seen on therecord.media Jump to article: therecord.media/maryland-pharmacist-keylogger-spying-lawsuit
-
Royal Mail untersucht Datenleck
by
in SecurityNewsDer britische Postdienst Royal Mail untersucht Hinweise auf ein Datenleck. Hintergrund könnte der gleiche wie bei dem Fall von Samsung Deutschland sein.Rund zwei Jahre nach der massiven Ransomware-Attacke auf Royal Mail kursieren aktuell Hinweise auf einen neuen Cybervorfall. Am 31. März behauptete ein Hacker namens ‘GHNA” in einem Darknet-Forum, dass er 144 Gigabyte Daten bei…
-
CERT-UA reports attacks in March 2025 targeting Ukrainian agencies with WRECKSTEEL Malware
by
in SecurityNewsCERT-UA reported three cyberattacks targeting Ukraine’s state agencies and critical infrastructure to steal sensitive data. The Computer Emergency Response Team of Ukraine (CERT-UA) reported three cyberattacks in March 2025 targeting Ukrainian agencies and infrastructure to steal sensitive data. This activity is tracked under the identifier UAC-0219. >>The Ukrainian government’s computer emergency response team, CERT-UA, is…
-
CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware
by
in SecurityNews
Tags: attack, computer, country, cyber, cyberattack, email, infrastructure, malware, phishing, ukraineThe Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data.The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing…
-
Connected cars drive into a cybersecurity crisis
by
in SecurityNewsTechnology has entered all areas of life, and our cars are no exception. They have become computers on wheels, equipped with sensors, software, and connectivity that provide … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/04/cybersecurity-risks-cars/
-
Poland’s prime minister says cyberattack targeted his party as election nears
by
in SecurityNewsAn official within the prime minister’s office said the attackers attempted to take control of computers belonging to both party employees and election staff. First seen on therecord.media Jump to article: therecord.media/poland-prime-minister-cyber-targeted
-
3 Leading Computer Monitoring Software for Schools
by
in SecurityNewsCybercriminals commonly target K-12 schools. 71% of UK secondary schools reported a breach or attack in the previous year alone, mirrored by schools across the U.S. This, paired with internal threats, requires schools to adopt advanced computer monitoring tools. In this article, we’ll cover key features to consider in computer monitoring software and three ……
-
UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers
by
in SecurityNews
Tags: attack, computer, cyber, cyberattack, data, government, group, hacker, malware, powershell, tool, ukraineIn a concerning development, CERT-UA, Ukraine’s Computer Emergency Response Team, has reported a series of cyberattacks attributed to the hacker group identified as UAC-0219. These attacks, which have been ongoing since the fall of 2024, utilize an advanced PowerShell-based malware tool named WRECKSTEEL to infiltrate computers and extract sensitive data. The primary targets include government…
-
Veterans are an obvious fit for cybersecurity, but tailored support ensures they succeed
by
in SecurityNewsSecurity is built into just about any military role: “Veterans make great cybersecurity specialists, because they’ve had security-focused roles, whether physical or information security, no matter what branch of the service they were in,” says Bryan Radliff, a 31-year veteran of the US Army who now serves as the CyberVets program manager in the Onward…