House Passes Reauthorization of Key US Surveillance Program After Days of Upheaval Over Changes
Keywords/Tags: Government, Privacy & Compliance, Tracking & Law Enforcement, FISA, Surveillance Article Source: SecurityWeek The bill was approved on a bipartisan basis, 273-147, though it will still have to clear…
State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls
Keywords/Tags: Malware & Threats, exploited, firewall, Palo Alto Networks Article Source: SecurityWeek A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two…
Wiz Acquires Gem Security, Pushes Security Tools Consolidation
Keywords/Tags: Cloud Security, Funding/M&A, M&A Tracker, Gem Security, Team8, Wiz Article Source: SecurityWeek Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal…
RubyCarp: Insights Into the Longevity of a Romanian Cybercriminal Gang
Keywords/Tags: Cybercrime, cybercrime, RubyCarp Article Source: SecurityWeek Operational for at least ten years, RubyCarp has its own botnet, its own tools, and its own community of users that concentrate on…
US-China Competition to Field Military Drone Swarms Could Fuel Global Arms Race
Keywords/Tags: Artificial Intelligence, Cyberwarfare, AI, drone Article Source: SecurityWeek Military planners envision a scenario in which hundreds, even thousands of AI-powered machines engage in coordinated battle. The post US-China Competition…
In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns
Keywords/Tags: Threat Intelligence, In Other News Article Source: SecurityWeek Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain…
House Will Try Again on Reauthorization of US Spy Program After Republican Upheaval
Keywords/Tags: Government, Tracking & Law Enforcement, FISA Article Source: SecurityWeek Speaker Mike Johnson is expected to bring forward a Plan B that would reform and extend Section 702 of the…
Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars
Keywords/Tags: IoT Security, Vulnerabilities, D-Link, exploited Article Source: SecurityWeek Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar. The post Exploitation of Unpatched D-Link…
Palo Alto Networks Warns of Exploited Firewall Vulnerability
Keywords/Tags: Vulnerabilities, exploited, Featured, firewall, Palo Alto Networks Article Source: SecurityWeek Palo Alto Networks warns of limited exploitation of a critical command injection vulnerability leading to code execution on firewalls.…
‘BatBadBut’ Command Injection Vulnerability Affects Multiple Programming Languages
Keywords/Tags: Application Security, vulnerability Article Source: SecurityWeek A critical vulnerability in multiple programming languages allows attackers to inject commands in Windows applications. The post ‘BatBadBut’ Command Injection Vulnerability Affects Multiple…