Security
Headlines
HeadlinesLatestCVEs

Tag

#amazon

Microsoft PlayReady Cryptography Weakness

There is yet another attack possible against Protected Media Path process beyond the one involving two global XOR keys. The new attack may also result in the extraction of a plaintext content key value.

Packet Storm
#mac#microsoft#amazon#git#pdf
School Employee Allegedly Framed a Principal With Racist Deepfake Rant

Plus: Google holds off on killing cookies, Samourai Wallet founders get arrested, and GM stops driver surveillance program.

FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement

The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.

Ring agrees to pay $5.6 million after cameras were used to spy on customers

The FTC is paying Ring customers in the US a totoal of $5.6 million over charges that the company allowed employees to access private videos.

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

Thousands of exposed files on a misconfigured North Korean server hint at one way the reclusive country may evade international sanctions.

Law enforcement reels in phishing-as-a-service whopper

A major international law enforcement effort has disrupted the notorious LabHost phishing-as-a-service platform.

Open Source Tool Looks for Signals in Noisy AWS Cloud Logs

Permiso Security announced Cloud Console Cartographer during Black Hat Asia to help defenders look inside Amazon Web Services events logs for signs of cyberattacks.

Learn about trends and best practices from top security experts at Red Hat and NIST's Cybersecurity Open Forum

Red Hat and the National Institute of Standards and Technology (NIST) are pleased to announce our third annual Cybersecurity Open Forum – Improving the Nation’s Cybersecurity. On April 24, 2024, cybersecurity experts will gather in Washington, D.C., to share best practices and strategies for successfully navigating the evolving cybersecurity landscape. As threats evolve in sophistication and scale, government and industry must adapt swiftly and effectively to protect data and infrastructure.Attendees will learn about the nature of cybersecurity vulnerabilities, strategies to enable protect

Countering Voice Fraud in the Age of AI

Caller ID spoofing and AI voice deepfakes are supercharging phone scams. Fortunately, we have tools that help organizations and people protect themselves against the devious combination.

Big Tech Says Spy Bill Turns Its Workers Into Informants

One of Silicon Valley’s most influential lobbying arms joins privacy reformers in a fight against the Biden administration–backed expansion of a major US surveillance program.