BSODs hit thousands of Windows PCs due to “a defect” in an update from CrowdStrike, taking banks, airlines, and more businesses offline; Microsoft is aware
or CrowdStrike Microsoft : HELPFUL LINKS — Get notified of outages that impact you — Building reliable applications on Azure The Record : IT teams scramble to recover from CrowdStrike incident as ...
Analysis: tweets about CVEs, which peaked before Elon Musk took over, show a steep decline in recent months, suggesting the infosec Twitter community has shrunk
https://www.cyentia.com/... Eduardo Cuducos / @cuducos.me : So long Infosec Twitter https://www.cyentia.com/... Mastodon: Dr. Juande Santander-Vela / @juandesant@astrodon.social : @Techmeme they might...
In a hearing with US lawmakers, ex-SolarWinds CEO blamed an intern for the “solarwinds123” password leak discovered in 2019 that had exposed a SolarWinds server
FireEye CEO on how the SolarWinds hack was discovered — Washington (CNN)Current and former top executives … Tweets: @cnn , @iwillleavenow , @joshelman , @jeffelder , @acdha , @dangillmor , @joeuchil...
Trump signs an executive order that seeks to thwart foreign use of cloud computing products or services for malicious cyber operations against the US
Netflix content ‘turning point’, Jack's back, Samsung robots Joel Khalili / TechRadar : Trump looks to block foreign actors from US cloud computing services Tweets: Annie Apple / @survivinamerica : On...
The quick evacuation of the Capitol left computers and devices unattended while the mob ransacked offices, a nightmare scenario for cybersecurity professionals
'Consider Them All Compromised' Samantha Masunaga / Los Angeles Times : The attack on the Capitol may pose a cybersecurity risk. Here's how Tweets: Senator Jeff Merkley / @senjeffmerkley : The trail ...
MIT researchers show ML models aren't yet capable of effectively distinguishing false news reports and reveal flaws in a commonly used database in the field
Joe Uchill / Axios : See also Mediagazer
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...
Radiohead says they're releasing 18 hours' worth of unheard music to benefit climate change group, after hackers stole lead singer's files and attempted ransom
And Won Brian Barrett / Wired : Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates Shawn Knight / TechSpot : Radiohead releases 18 hours of demos, thwarting alleged extortion attempt Exti...
Amazon emails an unknown number of customers disclosing a “technical error” that exposed emails and names, but provides few other details
but doesn't disclose details Duncan Riley / SiliconANGLE : Amazon blames ‘technical issue’ for exposing customer names and email addresses Lauren Feiner / CNBC : Amazon exposed customer names and emai...