Source: the US National Nuclear Security Administration was among those breached by a hack of SharePoint; no sensitive information is known to be compromised
The US agency responsible for maintaining and designing the nation's cache of nuclear weapons was among those breached by a hack …
Microsoft says it “has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting” the SharePoint zero-day vulnerabilities
He said not as vulnerable as on-prem SharePoint right now. — #nerdromancewithpits @wylienewmark : back in the day, attribution of widespread exploitation of a vulnerability in a ...
Q&A with FTC Privacy and Identity Protection executive Ben Wiseman on proposed commercial surveillance rules, connected car industry's data practices, and more
Suzanne Smalley / The Record : X: @montezumachavez , @mario_gug , @saalevine , and @therecord_media X: Luis Montezuma / @montezumachavez : RFN: What lessons have you learned from ...
Apple changed “state-sponsored” to “mercenary spyware” in threat notifications, a source says after pressure from India for linking breaches to state actors
Q&A with FBI Director Christopher Wray on taking down a GRU botnet, Volt Typhoon, critical infrastructure attacks, lessons from surveilling threat actors, more
The Record : X: @therecord_media and @nprdina X: @therecord_media : In an exclusive interview with @ClickHereShow, FBI Director Christopher Wray talks about Operation Dying Ember,...
The FTC proposes new rules that would make companies liable if they “know or have reason to know” their AI tech is being used to harmfully impersonate consumers
The US Federal Trade Commission moved to put new rules into place around impersonation, citing the rising threat …
Q&A with Sen. Brian Schatz on Congress' dysfunction in the tech space, regulating tech firms, the EU's DMA, AI, deepfakes, social media laws for kids, and more
Today, I'm talking with Senator Brian Schatz of Hawaii. He's been in the Senate for a little more than a decade now, and he's seen a lot in that time.
Legislators and privacy experts detail how the tech industry has sought to water down state privacy regulation in the US; 13 US states now have privacy laws
Suzanne Smalley / The Record :
A US judge rules that automakers' use of on-board infotainment systems to record and intercept owners' texts and call logs doesn't violate Washington state law
A federal judge on Tuesday refused to bring back a class action lawsuit alleging four auto manufacturers had violated Washington …
Oligo Security finds since-patched RCE flaws in open-source AI model-serving tool TorchServe and vulnerable instances at tens of thousands of IP addresses
Oligo Security finds since-patched RCE flaws in open-source AI model-serving tool TorchServe and vulnerable instances at tens of thousands of IP addresses
Halcyon: Cloudzy, a Wyoming-registered web hosting company likely operating out of Tehran, is acting as a command-and-control provider for state-backed hackers
A little-known cloud company provided web hosting and internet services to more than two dozen different state-sponsored hacking groups …
After Fortinet patched a major FortiOS bug on June 12, researchers find that ~336K out of ~490K affected SSL VPN interfaces are still unpatched and open to RCE
many used by government organizations — aren't patched to deal with a critical bug identified last month https://therecord.media/...
The FDA says approval for medical devices now requires meeting certain cybersecurity standards issued in the omnibus spending bill signed in December 2022
The Food and Drug Administration affirmed Wednesday that medical device manufacturers must now prove their products meet certain …
Q&A with two of Meta's leading security experts about its Online Operations Kill Chain, a framework for responding to threat activity like influence operations
Next year will feature some of the most geopolitically significant elections of our times.
Q&A with two of Meta's leading security experts about its Online Operations Kill Chain, a framework for responding to threat activity like influence operations
Next year will feature some of the most geopolitically significant elections of our times.
The City of Oakland confirms reports of a ransomware attack on its networks but says that 911, financial data, and fire and emergency resources weren't impacted
The City of Oakland confirmed reports that its networks had been hit with ransomware after rumors emerged online that several agencies …
The City of Oakland confirms reports of a ransomware attack on its networks but says 911, financial data, and fire and emergency resources were not impacted
The City of Oakland confirmed reports that its networks had been hit with ransomware after rumors emerged online that several agencies …
US prosecutors say two men conspired with Russian hackers to tamper with JFK airport's taxi queuing software, allegedly letting drivers cut the line for a fee
James Reddick / The Record :
Microsoft accuses China-backed nation state hackers of abusing the country's vulnerability disclosure requirements to discover and develop zero-day exploits
Jonathan Greig / The Record :