Seclook App Icon

Today's News

BreachRx Raises $6.5M to Revamp Incident Response Reporting Systems

2024-04-19 17:14:33 UTC

Startup BreachRx has secured $6.5 million in funding to revamp incident response reporting systems. Investors are betting on the promise of shielding cybersecurity executives from personal liability. The funding comes as a boost to the company's efforts to enhance cybersecurity measures.

Read More
Start Hacking for FREE

2024-04-19 16:56:14 UTC

Get started with hacking for free by checking out Keeper Security's privileged access management solution. This platform offers password, secrets, and privileged connection management, protecting organizations against cyber threats with zero-trust Enterprise Password Management (EPM). To learn more, visit https://www.tcm.rocks/KeeperDemo. For additional resources and training in hacking, visit sites like Root Me, Hack This Site, and Try Hack Me, or watch videos from IppSec and Rana Khalil on YouTube. Those interested can also sponsor a video, schedule pentests and security consulting, get trained, or get certified through related services. Social media links and donation options are also provided for further engagement.

Read More
The Biggest Deepfake Porn Website Is Now Blocked in the UK

2024-04-19 16:54:17 UTC

The UK has blocked access to the largest deepfake porn website, as well as a major competitor, following the government's crackdown on such platforms.

Read More
Threat-Intelligence Startup VulnCheck Closes $8M Seed Financing

2024-04-19 14:36:59 UTC

VulnCheck, a startup focused on threat intelligence, has secured $8 million in seed financing to develop "exploit intelligence" technologies and services. The funding will support the growth of the company as it continues to innovate in the cybersecurity space. (27 words)

Read More
In Other News: OSS Backdooring Attempts, Botnet Operator Charged, Automotive Firm Attack

2024-04-19 13:24:10 UTC

In recent news, there have been reports of attempted backdooring in open source software, a botnet operator being charged in Moldova, and a US automotive company being targeted by the FIN7 hacking group. These incidents have similarities to the XZ backdoor and have raised concerns about cybersecurity. Read more on SecurityWeek.

Read More
NinjaOne vs. Atera: A Deep Comparison Between the Solutions

2024-04-19 13:19:02 UTC

In the latest comparison of NinjaOne and Atera RMM solutions, MSP businesses are advised to carefully consider their options. These platforms are essential for overseeing IT environments and managing various tasks like patches and updates. With a plethora of RMM tools available, choosing the right one is crucial for the success of any MSP business.

Read More
The Good, the Bad and the Ugly in Cybersecurity – Week 16

2024-04-19 13:00:56 UTC

In cybersecurity news for Week 16, a cryptojacker and botnet operator have been indicted by the Department of Justice. Water suppliers are being targeted by the GBU-linked Sandworm group. Additionally, a zero-day exploit in Palo Alto has been observed being exploited in-the-wild.

Read More
Government Unveils Malware Analysis Tool, But...

2024-04-19 13:00:52 UTC

The government has revealed a new Malware Analysis Tool called CISA's Malware Next-Gen, designed to enhance cybersecurity. John Hammond is also offering training on the subject with a "Name Your Price" system. To receive updates and support the channel, viewers can subscribe to Hammond's newsletter and Patreon. Additionally, individuals can sponsor the channel and follow Hammond on various social media platforms. There is also an option to send malware for analysis. To support the YouTube channel, viewers are encouraged to like, comment, and subscribe.

Read More
First Major Attempts to Regulate AI Face Headwinds From All Sides

2024-04-19 12:52:12 UTC

Efforts to regulate artificial intelligence are encountering resistance from various sectors as over 400 bills related to AI are being debated in state legislatures across the country. Most of these bills focus on regulating specific industries or aspects of AI technology, such as deepfakes in elections. The challenges facing the first major attempts to regulate AI are being discussed in an article on SecurityWeek.

Read More
Deceptive Google Ads Mimic IP Scanner Software to Push Backdoor

2024-04-19 12:23:49 UTC

Cybersecurity experts have discovered a sneaky malvertising campaign using fake Google ads to distribute a backdoor called ‘MadMxShell’. The ads imitate legitimate IP scanner software and are linked to 45 suspicious domains registered between November 2023 and March 2014. The campaign tricks users into downloading the backdoor by posing as trusted IP scanning tools like Angry IP Scanner. Stay informed and stay safe online.

Read More
US Government Releases Guidance on Securing Election Infrastructure

2024-04-19 11:38:20 UTC

The US government has released new guidance on securing election infrastructure, offering details on foreign malign influence operations to help stakeholders enhance resilience. The information aims to support efforts in safeguarding the integrity of the electoral process.

Read More
Akira Ransomware Made Over $42 Million in One Year: Agencies

2024-04-19 11:25:16 UTC

Agencies report that the Akira ransomware has raked in more than $42 million in ransom payments from over 250 organizations globally in just one year.

Read More
Frontier Communications Shuts Down Systems Following Cyberattack

2024-04-19 11:12:58 UTC

In response to a cyberattack compromising personal information, telecom giant Frontier Communications has temporarily shut down systems to contain the breach. The incident has caused concern over the security of customer data.

Read More
How Attackers Can Own a Business Without Touching the Endpoint

2024-04-19 11:08:00 UTC

Attackers are now able to take control of businesses without needing direct access to the endpoint thanks to "networkless" attack techniques that focus on cloud apps and identities. This new approach allows attackers to compromise organizations without touching traditional networked systems. Before diving into the specifics of these techniques, it is important to understand why this shift is occurring.

Read More
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

2024-04-19 11:01:00 UTC

The Akira Ransomware Gang has successfully extorted $42 million from over 250 victims and is now shifting its focus towards targeting Linux servers. Since March 2023, the threat actors behind Akira ransomware have impacted various businesses and critical infrastructure entities in North America, Europe, and Australia, according to cybersecurity agencies from the Netherlands and the U.S.

Read More
OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes Clusters for Cryptomining

2024-04-19 08:59:00 UTC

Microsoft has issued a warning about the abuse of OpenMetadata vulnerabilities to deploy cryptomining malware in Kubernetes clusters. The vulnerabilities are being exploited to target Kubernetes environments for illicit cryptomining activities, as reported by SecurityWeek.

Read More
Should power affect the speed of external SSDs?

2024-04-19 06:30:00 UTC

Are external SSDs drawing too much power from Thunderbolt or USB4? This raises concerns about potential consequences in terms of heat.

Read More
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor

2024-04-19 06:16:00 UTC

A new backdoor called CR4T has been discovered targeting government entities in the Middle East as part of a previously undocumented campaign. The activity was uncovered by Russian cybersecurity company Kaspersky in February 2024, with evidence indicating it may have been active for at least a year prior. The campaign has been codenamed by Kaspersky.

Read More
Risky Biz News: Authorities take down LabHost PhaaS

2024-04-19 00:07:26 UTC

In the latest episode of Risky Biz News, authorities have successfully shut down LabHost PhaaS. The news update, narrated by Claire Aird and compiled by Catalin Cimpanu, covers recent security developments. Those interested in the newsletter version of the podcast can find it online.

Read More
CPU Pipeline - Computerphile

2024-04-18 20:17:46 UTC

In a recent video from Computerphile, Matt Godbolt explains how CPUs optimize their compute time by utilizing the pipeline. The goal is to allow the CPU to work efficiently with each tick of the system clock. This video, filmed and edited by Sean Riley, is part of the Computer Science program at the University of Nottingham. Computerphile is a sister project to Numberphile, created by Brady Haran. Special thanks to Jane Street for their support of the channel. For more information, visit their social media pages and website.

Read More
How Golden Ticket Attacks Work

2024-04-18 19:31:13 UTC

Learn how Golden Ticket Attacks can grant access to an entire domain in Active Directory. Join the April Hacking (and Defending) Active Directory Live Training on April 26 with Heath. Register now at https://www.tcm.rocks/ada-y for exclusive one-day training. Don't miss out on this opportunity to enhance your cybersecurity knowledge. #activedirectory #cybersecurity #thecybermentor #infosec #goldenticket.

Read More
The Trump Jury Has a Doxing Problem

2024-04-18 19:25:53 UTC

A juror in the criminal case of former US President Donald Trump in New York has been excused due to concerns over potential doxing, raising fears of further complications in the trial.

Read More
2023 ISO 27001 certificate available in Spanish and French, and 2023 ISO 22301 certificate available in Spanish

2024-04-18 18:48:06 UTC

Amazon Web Services (AWS) has introduced translated versions of their 2023 ISO 27001 and 2023 ISO 22301 certifications in Spanish and French. The 2023 ISO 27001 certificate is now accessible in both Spanish and French, while the 2023 ISO 22301 certificate is available in Spanish. These translated certificates are now offered to customers, providing increased accessibility for non-English speakers.

Read More