article thumbnail

Security Affairs newsletter Round 463 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

France Travail data breach impacted 43 Million people Scranton School District in Pennsylvania suffered a ransomware attack Lazarus APT group returned to Tornado Cash to launder stolen funds Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case UK Defence Secretary jet hit by an electronic warfare attack in Poland Cisco (..)

article thumbnail

Vulnerability Recap 3/25/24 – More Ivanti Issues to Patch

eSecurity Planet

We also saw a physical security issue in Saflok electronic locks, which affects hotels in over a hundred countries. March 13, 2024 Fortra Vulnerability Could Result in Remote Code Execution Type of vulnerability: Directory traversal in Fortra’s FileCatalyst workflow, potentially leading to remote code execution. and 9.19.0,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. He is 36 years old, has a wife and kids in Thailand, and is slated for release on February 8, 2024. The Spamdot admins went by the nicknames Icamis (a.k.a.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

Once in place, manufacturers will have 30 months to begin meeting the new legal requirements, giving them until mid-2024 to bring the devices into compliance. The result has been devices with trivial vulnerabilities or flaws that have been solved for a decade or longer in traditional computing. Device Maintenance Still Needed.

IoT 109
article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices. In China, the retail drone market reached $15 billion in 2021, with projections to exceed $22 billion by 2024. that require registration with local or federal authorities.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Quantum computing attacks already present a real threat to existing standards, making the continued development of encryption pivotal for years to come. Cryptology is the overarching field of study related to writing and solving codes, whereas encryption and decryption are the central processes driving the computer science discipline.

article thumbnail

Vint Cerf: Maybe We Need an Internet Driver’s License

John Battelle's Searchblog

Is there a moment in the history of computing that is as significant as the one we’re in now? We clearly know in 2024, that the situation is a little more complex than that, that there is harmful behavior on the network. And that has been the workhorse of the design of computer chips for years and years.