Recent Security News

  • Signal Debunks Zero-Day Vulnerability Reports, Finds No Evidence

    October 16, 2023 at 06:30AM Messaging app Signal denies the existence of a zero-day flaw in its software, stating that it found no evidence to support the claim. The company has checked with the U.S. government and is urging users with legitimate information to report it. As a precaution, users have been advised to disable…

    Read More

  • Spyware Caught Masquerading as Israeli Rocket Alert Applications

    October 16, 2023 at 06:24AM Israeli rocket alerting applications have been targeted by threat actors following the Israel-Gaza conflict. AnonGhost, a pro-Palestinian hacktivist group, successfully compromised at least one application, sending fake alerts including nuclear bomb messages. Another threat actor created a malicious version of the ‘RedAlert – Rocket Alerts’ app to infect users with…

    Read More

  • EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits

    October 16, 2023 at 06:24AM The US Environmental Protection Agency (EPA) has withdrawn cybersecurity rules for public water systems due to lawsuits filed by states and non-profit water associations. The attorney generals of Missouri, Arkansas, and Iowa challenged the requirements, arguing they would burden small towns financially. The American Water Works Association (AWWA) and the…

    Read More

  • Beware: Lumma Stealer Distributed via Discord CDN

    October 16, 2023 at 04:37AM Discord’s content delivery network (CDN) is being exploited by threat actors to distribute the Lumma Stealer malware, which steals user credentials. The malware is spread through direct messages, offering victims Discord Nitro boost in exchange for assistance and prompting them to download a file. Lumma Stealer can steal cryptocurrency wallets…

    Read More

  • Why Zero Trust Is the Cloud Security Imperative

    October 16, 2023 at 03:07AM Zero trust, a security concept, is crucial for protecting cloud environments due to the increasing prevalence of data breaches and cyberattacks. Traditional security models that rely on securing the network perimeter are ineffective in cloud environments where data is dispersed and accessed from anywhere. Zero trust emphasizes continuous verification, least…

    Read More