A series of vulnerabilities affecting industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to internal operational technology (OT) networks from the internet.
Cybersecurity Experts Cast Doubt on Hackers’ ICS Ransomware Claims
A hacktivist group has made bold claims regarding an attack on an industrial control system (ICS) device, but industry professionals have questioned their claims.
FCC Proposes Tighter Data Breach Reporting Rules for Wireless Carriers
The Federal Communications Commission (FCC) is proposing tighter rules on the reporting of data breaches by wireless carriers.
The updated rules, the FCC says, will fall in line with recent changes in federal and state laws regarding data breaches in other sectors.
US Government Agencies Issue Guidance on Threats to 5G Network Slicing
The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have released guidance on the security risks associated with 5G network slicing and mitigation strategies.
LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems
Mordechai Guri, a cybersecurity researcher from the Ben-Gurion University of the Negev in Israel who specializes in air gap jumping, has released a paper detailing yet another method that can be used to stealthily exfiltrate data from systems isolated from the internet and local networks.
Proofpoint: Watch Out for Nighthawk Hacking Tool Abuse
Security researchers at Proofpoint are calling attention to the discovery of a commercial red-teaming tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors.
Akeyless Raises $65 Million for Secrets Management Tech
Israeli early-stage startup Akeyless has banked a whopping $65 million in venture capital funding to build technology to help businesses manage credentials, certificates, keys and other secrets flowing through multi-cloud environments.
Bishop Fox Adds $46 Million to Series B Funding Round
Continuous attack surface management pioneer Bishop Fox continues to attract the attention of investors with the banking of another $46 million in growth funding led by WestCap.
Microsoft: China Flaw Disclosure Law Part of Zero-Day Exploit Surge
The world’s largest software maker is warning that China-based nation state threat actors are taking advantage of a one-year-old law to “stockpile” zero-days for use in sustained malware attacks.
IDA Pro Owner Hex-Rays Acquired by European VC Firm
European venture capital and private equity firm Smartfin on Tuesday announced a deal to acquire Hex-Rays, the Belgian company behind the widely deployed IDA Pro software disassembler.