lemmydev2

joined 2 years ago
 

MITRE has introduced AADAPT (Adversarial Actions in Digital Asset Payment Technologies), a new cybersecurity framework designed to tackle vulnerabilities in digital financial ecosystems, including cryptocurrency platforms. Modeled after the MITRE ATT&CK framework, AADAPT offers developers, policymakers, and financial institutions a structured approach to identifying, analyzing, and mitigating threats tied to digital asset payment technologies. Drawing on insights from over 150 sources across government, industry, and academia, the framework maps adversarial tactics, techniques, and procedures (TTPs) … More → The post New MITRE framework takes aim at crypto threats appeared first on Help Net Security.

 

The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.

 

The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity generating logs. Honeypots can see large increases in activity [1], but this has tended to be the exception, rather than the rule. Within the last few months, however, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from my residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that I run and archive logs from frequently.

 

UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts. [...]

 

In the race to develop artificial intelligence, tech giants are building data centers that guzzle up water. That has led to problems for people who live nearby.

 

A vulnerability in Kigen eUICC cards has exposed billions of IoT devices via flawed eSIM profile management

 

The high-severity flaw could let a hacker abruptly halt — and potentially derail — a train.

 

Security researchers have uncovered a significant vulnerability in Google Gemini for Workspace that enables threat actors to embed hidden malicious instructions within emails. The attack exploits the AI assistant’s “Summarize this email” feature to display fabricated security warnings that appear to originate from Google itself, potentially leading to credential theft and social engineering attacks. Key […] The post Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails appeared first on Cyber Security News.

 

Spain gives Huawei wiretap contracts, sparking concerns over potential Chinese government access due to Huawei’s links to Beijing. The Spanish Ministry of the Interior has awarded €12.3 million ($14.3 million) contracts to manage and store judicially authorized wiretaps used by law enforcement and intelligence agencies, raising concerns about potential Chinese government access due to the […]

 

Comments

 

Comments

 

Follows earlier arrests in November.

view more: ‹ prev next ›