Yamaha Motor confirms ransomware attack on Philippines subsidiary

November 17, 2023 at 11:47AM Yamaha Motor’s motorcycle manufacturing subsidiary in the Philippines was hit by a ransomware attack, resulting in the theft and leak of some employees’ personal information. The breach was detected on October 25, and the company has been investigating with the help of external security experts. The attack was attributed to … Read more

Leaky DICOM Medical Standard Exposes Millions of Patient Records

November 10, 2023 at 01:12PM Researchers have discovered that around 60 million personal and medical records may have been exposed due to the use of a legacy protocol in medical equipment. The researchers found that many users of the protocol do not implement security controls, leading to data leakage. The protocol does have security measures, … Read more

Hands on Review: LayerX’s Enterprise Browser Security Extension

November 1, 2023 at 08:12AM LayerX is a secure enterprise browser extension that provides comprehensive visibility, continuous monitoring, and granular policy enforcement on browsing sessions. It addresses the challenge of protecting the browser against web-borne attacks and data leakage. LayerX offers features such as installation and setup, a dashboard for high-level insights, discovery of entities … Read more

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

October 27, 2023 at 08:00AM Google is expanding its Vulnerability Rewards Program to reward researchers for finding vulnerabilities in generative artificial intelligence systems. The program aims to address concerns such as bias, model manipulation, and data misinterpretation. Additionally, Google is working on securing the AI supply chain through open-source security initiatives. OpenAI has also formed … Read more

New iLeakage attack steals emails, passwords from Apple Safari

October 26, 2023 at 07:32AM Researchers have developed a new side-channel attack called iLeakage that can extract sensitive information from Safari on Apple devices. It bypasses standard side-channel protections and can retrieve data from Safari, Firefox, Tor, and Edge on iOS with near-perfect accuracy. The attack exploits speculative execution in Apple Silicon CPUs and requires … Read more