Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Khorasan Razavi, Iran

0

سبد خرید

article

Rackspace says hackers accessed customer data during ransomware attack

Cloud computing giant Rackspace has confirmed hackers accessed customer data during last month’s ransomware attack. The attack, which Rackspace first confirmed on December 6, impacted the company’s hosted Exchange email environment, forcing the web giant to shut down the hosted email service following the incident. At the time, Rackspace said it was unaware “what, if […]

article

US family planning nonprofit MFHS says patient medical data stolen in ransomware attack

U.S. nonprofit healthcare giant Maternal & Family Health Services has confirmed hackers accessed sensitive patient, financial and medical information months earlier. In an advisory published on its website on Thursday, MFHS said a “sophisticated ransomware incident” exposed the sensitive information of current and former patients, employees and vendors. This information included names, addresses, dates of birth, Social Security numbers, […]

article

Ring brings back the Peephole Cam, now starting at $129

In 2019, Ring launched the Peephole Cam, a camera that fits over existing door peepholes to record goings-on outdoors, in apartment building hallways and so on. Priced at $199, the Peephole Cam failed to catch on, leading Ring to discontinue it in 2021. But now, Ring’s giving it another go — the Peephole Cam made […]

article

CircleCI warns customers to rotate ‘any and all secrets’ after hack

CircleCI, a company whose development products are popular with software engineers, has urged users to rotate their secrets following a breach of the company’s systems. The San Francisco–headquartered DevOps company said in an advisory published late Wednesday that it is currently investigating the security incident — its most recent in recent years. “We wanted to make you […]

article

Lockbit, Hive, and BlackCat attack automotive supplier in triple ransomware attack

After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks – 1 entry point. Written by Linda Smith, Rajat Wason, Syed Zaidi AUGUST 10, 2022 SECURITY OPERATIONS ACTIVE ADVERSARY PLAYBOOK BLACKCAT FEATURED HIVE LOCKBIT RANSOMWARE SOPHOS X-OPS In May 2022, an automotive supplier was hit with three separate ransomware attacks. […]

article

Hackers claim ransomware attack on Los Angeles housing authority

The Housing Authority of the City of Los Angeles, or HACLA, has confirmed it is investigating a cybersecurity incident shortly after the LockBit ransomware gang claimed responsibility for a cyberattack on the agency. HACLA, which provides affordable housing to more than 19,000 low-income families across Los Angeles, was added to LockBit’s dark web leak site on […]

article

Arch Linux’s First ISO Release in 2023 Is Out and It’s Powered by Linux Kernel 6.1

Arch Linux is the first GNU/Linux distribution to kick off 2023 with a new ISO release targeting those who want to deploy Arch Linux on new computers, chroot into an existing one to repair it, or just reinstall their systems. Arch Linux 2023.01.01 is not only Arch Linux’s first ISO release in 2023, but it’s […]

article

Update Android Right Now to Fix a Scary Remote-Execution Flaw

The holiday season is almost over, but security patches are still continuing to arrive thick and fast in December. The month has seen updates released by Apple, Google, and Microsoft, as well as enterprise software companies including the likes of SAP, Citrix, and VMWare. Many of the patches fix zero-day vulnerabilities already being exploited in […]

article

Code-generating AI can introduce security vulnerabilities, study finds

A recent study finds that software engineers who use code-generating AI systems are more likely to cause security vulnerabilities in the apps they develop. The paper, co-authored by a team of researchers affiliated with Stanford, highlights the potential pitfalls of code-generating systems as vendors like GitHub start marketing them in earnest. “Code-generating systems are currently […]

article

It’s all in the (lack of) details: 2022’s badly handled data breaches

ata breaches can be extremely harmful to organizations of all shapes and sizes — but it’s how these companies react to the incident that can deal their final blow. While we’ve seen some excellent examples of how companies should respond to data breaches over the past year — kudos to Red Cross and Amnesty for their transparency — 2022 has been a […]

© All rights reserved to APA Specialized Center of Ferdowsi University of Mashhad