Category: Shorts
-
Sonos Patent Infringement Victory
by
in ShortsSonos Patent Infringement Victory Google has been ordered to pay Sonos $32.5 million for infringing on the company’s smart speaker patent. A jury verdict issued in a San Francisco courtroom on Friday found that Google’s smart speakers and media players infringed on one of two Sonos patents. The verdict re-affirms that Google is a serial…
-
Google’s new Magic Compose beta is here! But be careful, it
by
in ShortsGoogle’s new Magic Compose beta is here! But be careful, it Finally, it’s time for the public beta of Google’s new Messages feature that uses artificial intelligence to help you write text messages. Called Magic Compose, the company claims that it can read your messages, though The Verge reports that it still can’t actually read…
-
Google’s Breakthrough Framework for Secure Software Supply Chains – GUAC 0.1 Beta
by
in ShortsGoogle’s Breakthrough Framework for Secure Software Supply Chains – GUAC 0.1 Beta Google on Wednesday announced the 0.1 Beta version of its GUAC (short for Graph for Understanding Artifact Composition) tool for analyzing software supply chains. GuAC aims to aggregate software security metadata from different sources into a graph database that maps out relationships between…
-
Hackers from Iran are targeting Israeli organizations with ransomware called Moneybird.
by
in ShortsHackers from Iran are targeting Israeli organizations with ransomware called Moneybird. The company also warns that an Iranian threat actor known as Agrius has begun using a new ransomware strain called Moneybird in its attacks against Israeli organizations. Agrius, also known as Pink Sandstorm or Americium, has a track record of staging destructive data-wiping attacks…
-
China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure
by
in ShortsChina’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure A stealthy China-based group has managed to gain a foothold in several critical infrastructure organizations in the U.S. and Guam without being detected, according to Microsoft and the Five Eyes nations. The tech giant’s threat intelligence team is tracking the activity, which includes post-compromise credential access…
-
Buhti ransomware gang switches tactics, utilizes leaked LockBit and Babuk code
by
in ShortsBuhti ransomware gang switches tactics, utilizes leaked LockBit and Babuk code Buhti ransomware targetting Linux and Windows customers is a new kind of ransomware. Previous ransomware families that targeted Linux include those from LockBit and Babuk, as well as some from the Bl00dy Ransomware Gang. Buhti does not have a custom payload and can be…
-
Browser Security: New Approaches with Guest Forrester
by
in ShortsBrowser Security: New Approaches with Guest Forrester In order to make organizations aware of the latest threats to browser security, LayerX is hosting a webinar featuring Guest Speaker Paddy Harrington, a Senior Analyst at Forrester and the lead author of Forresters report Securing the Browser In The World Of Anywhere Work. In this webinar, Harrington…
-
Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks Alert:
by
in ShortsAlert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks Alert: A brasilian threat actor has hit up more than 30 Portuguese financial institutions with information-stealing malware in a campaign that began in 2021. The sophisticated hacking effort represents the latest iteration in a long line of financially motivated malware campaigns originating from Latin America,…
-
A new backdoor used in an Iranian cyber attack on the UAE government has been identified.
by
in ShortsA new backdoor used in an Iranian cyber attack on the UAE government has been identified. This vulnerability was designed to allow an Iranian threat actor to remotely compromise a victim’s Exchange Server with a backdoor called PowerExchange. CVE-2018-0122 describes the capabilities of this so-called simple yet effective backdoor. PowerExchange, written in PowerShell, employs text…
-
Cynet Prevents Lethal Infection in Hospital
by
in ShortsCynet Prevents Lethal Infection in Hospital The hospital was in the process of upgrading its imaging systems. One of these systems had a USB key that could be used to store files on any device. Unfortunately, this USB key became infected with malware. Fortunately, the company uses Cynet’s technology to protect this key and prevent…
