Seclook App Icon

Today's News

Whale Song Code

2024-04-29 11:07:42 UTC

During the Cold War, the US Navy attempted to create a secret code using whale songs, dolphins, sea lions, and seals. The plan involved broadcasting these noises from submarines and using a computer, the Combo Signal Recognizer (CSR), to decode the messages on the other end. However, the authenticity of the code posed numerous challenges, as the natural background noise in the recordings made it difficult to create a clear and decipherable message. Despite these obstacles, the Navy persisted in their efforts between 1959 and 1965.

Read More
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

2024-04-29 10:54:00 UTC

In the face of the constantly growing complexity of modern cyber threats, security teams are turning to exposure management, pentesting, red teaming, and RBVM to navigate the threat landscape. As attackers use ever-evolving tactics, the need for better, more holistic approaches to security becomes increasingly clear. Teams are constantly seeking ways to reduce risk and enhance security posture in order to meet this ongoing challenge effectively.

Read More
Kaiser health insurance leaked patient data to advertisers

2024-04-29 10:44:47 UTC

Kaiser health insurance has revealed that it mistakenly leaked patient data to advertisers. The health insurance company, Kaiser, will be reaching out to millions of patients to inform them of the privacy breach.

Read More
29th April – Threat Intelligence Report

2024-04-29 10:32:41 UTC

The Threat Intelligence Report released on April 29th highlights a state-sponsored hacking campaign targeting Volkswagen by Chinese hackers since 2010. The attackers successfully infiltrated VW's networks multiple times, extracting thousands of critical documents. For more information, download the Threat Intelligence Bulletin from Check Point Research.

Read More
Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

2024-04-29 10:23:41 UTC

Okta has issued a warning about an increase in credential stuffing attacks utilizing services like Tor, DataImpulse, Luminati, and NSocks. These attacks are using residential proxies to enhance anonymity. The post from Okta highlights the dangers posed by these tactics and emphasizes the need for heightened cybersecurity measures.

Read More
2 Million Impacted by Data Breach at Debt Collector FBCS

2024-04-29 09:59:19 UTC

Financial Business and Consumer Solutions (FBCS) recently announced that a data breach has impacted 2 million individuals. The breach exposed sensitive information such as names, dates of birth, Social Security numbers, and account details. FBCS warns those affected to be vigilant about potential identity theft.

Read More
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

2024-04-29 09:58:00 UTC

Multiple critical security flaws in the Judge0 open-source online code execution system have been revealed, posing a danger of complete system takeover. These vulnerabilities, if exploited, could allow an attacker to execute code on the target system and gain root permissions. The flaws enable a malicious actor with enough access to perform a sandbox escape and seize control of the host machine. Australian researchers were the first to highlight the severity of these vulnerabilities.

Read More
Solutions to Saturday Mac riddles 253

2024-04-29 08:00:00 UTC

Here are the solutions to Saturday's Mac Riddles 253. Make sure to check out the answers to all the riddles from episode 253.

Read More
A week in security (April 22 – April 28)

2024-04-29 07:06:58 UTC

Here are the security highlights for the week of April 22 to April 28, 2024.

Read More
APFS: Beyond, to vfs and volfs

2024-04-29 06:30:00 UTC

The APFS file system is venturing beyond to include vfs and volfs, with a focus on the critical roles of vfs and vnodes employed by the kernel. These components play a crucial role in verifying code signatures, highlighting their significance in ensuring the security of the operating system.

Read More
Snake Oilers: Push Security, Knoc Knoc and iVerify

2024-04-29 06:12:13 UTC

In the latest edition of Snake Oilers, three cutting-edge security companies are highlighted. Push Security offers browser plugin-based protection against identity-based attacks. Knoc Knoc provides a tool for securing applications and services by restricting network access to authenticated users. Meanwhile, iVerify specializes in mobile security and threat hunting for iOS and Android, recently discovering and thwarting the dangerous Pegasus malware.

Read More
CISOs Confront AI Adapting Cybersecurity to the AI Era

2024-04-29 02:41:05 UTC

CISOs are facing the challenge of adapting cybersecurity to the AI era. Join Jerich Beason on an episode of Wait Just an Infosec as he delves into the impact of AI on cybersecurity leadership and strategy. In a series focusing on the struggles of modern CISOs, special guest Gatha Sadhir, CISO of Carnival Corporation, discusses the integration of AI into frameworks and preparing teams for the future. From addressing the generative AI revolution to strategizing for cybersecurity skills growth, this conversation highlights key issues at the intersection of AI and cybersecurity. Subscribe and attend live sessions for more discussions on technological adaptation in cybersecurity.

Read More
Risky Biz News: Cyber Partisans hack Belarus KGB

2024-04-29 02:22:40 UTC

In the latest episode of Risky Biz News, Cyber Partisans successfully hack Belarus KGB. The informative podcast, presented by Catalin Cimpanu and narrated by Claire Aird, provides a brief overview of recent security developments. For more details, check out the newsletter version.

Read More
Sponsored: Open source software's increasing vulnerability

2024-04-28 22:04:38 UTC

In an interview sponsored by Risky Business News, CEO and founder of Socket, Feross Aboukhadijeh, discusses the increasing vulnerability of open source software. Aboukhadijeh highlights the evolution of the software ecosystem, making it more susceptible to trust-based attacks like those seen in XZ Utils. He also provides insights on defending against supply chain subversion in the industry.

Read More
Hackers Claim to Have Infiltrated Belarus’ Main Security Service

2024-04-28 15:46:45 UTC

Belarusian hacker activists have allegedly breached the network of the country's main KGB security agency, gaining unauthorized access to personnel files of over 8,600 employees. The hackers' claim has raised concerns about the security of Belarus' main security service. The incident was reported by SecurityWeek.

Read More
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

2024-04-28 13:52:00 UTC

Okta has issued a warning about a significant increase in credential stuffing attacks driven by proxies. These attacks, observed in the last month, are being facilitated by the availability of residential proxy services and stolen credentials.

Read More