Pulse of Truth

1341 readers
114 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
1
 
 

Summer Maxwell / SFGATE: Location sharing apps like Find My, Snap Map, and Life360 remain popular among Gen Z users, despite concerns about their impact on real-world relationships  —  Teens and 20-somethings are embracing location sharing to see where their friends are instantly.  Is that a bad thing?

2
 
 

A Veeam survey found that 96% of financial services organizations believe their current levels of data resilience falls short of DORA compliance, citing major challenges

3
 
 

The announcement marks the second major Salt Typhoon incident in the space of two years

4
 
 

As the European Commission prepares an upcoming proposal for a Digital Networks Act (DNA), a growing network of groups are raising serious concerns about the resurgence of “fair share” proposals from major telecom operators. The original idea was to introduce network usage fees on certain companies to pay ISPs. We have said it before and we’ll say it again: there is nothing fair about this “fair share” proposal, which could undermine net neutrality and hurt consumers by changing how content is delivered online. Now the EU Commission is toying with an alternative idea: the introduction of a dispute resolution mechanism to foster commercial agreements between tech firms and telecom operators. EFF recently joined a broad group of more than 80 signatories, from civil society organizations to audio-visual companies in a joint statement aimed at preserving net neutrality in the DNA. In the letter, we argue that the push to introduce a mandatory dispute resolution mechanism into EU law would pave the way for content and application providers (CAPs) to pay network fees for delivering traffic. These ideas, recycled from 2022, are being marketed as necessary for funding infrastructure, but the real cost would fall on the open internet, competition, and users themselves. This isn't just about arcane telecom policy—it’s a battle over the future of the internet in Europe. If the DNA includes mechanisms that force payments from CAPs, we risk higher subscription costs,[...]

5
 
 

Steam, which has hosted sex games for years, says developers must now comply with the standards of payment processors and financial institutions.

6
 
 

Gets five-and-a-half years.

7
 
 

The hackers stole the company's member list, which included customer names, addresses, and contact information.

8
 
 

In a major blow to pro-Russian cybercrime, authorities across Europe and the United States launched a sweeping international crackdown on the hacking group NoName057(16) between 14 and 17 July. The coordinated operation, codenamed Eastwood and led by Europol and Eurojust, targeted the group’s members and infrastructure. Law enforcement and judicial authorities from Czechia, France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Netherlands, and the United States took part in the simultaneous actions. The … More → The post Global crackdown hits pro-Russian cybercrime, 100+ systems taken down worldwide appeared first on Help Net Security.

9
 
 

Microsoft is rolling out an update to Copilot Vision for Windows Insiders that lets the AI tool see everything that’s on your screen. Previously, the tool was able to look at two apps at a time and connect the dots between the two, but with this change, it can look at your whole desktop or […]

10
 
 

File this one under what not to search if you've committed a crime A former US Army soldier, who reportedly hacked AT&T, bragged about accessing President Donald Trump's call logs, and then Googled "can hacking be treason," and "US military personnel defecting to Russia," pleaded guilty to conspiring to break into telecom firms' databases and extort at least $1 million.…

11
 
 

Radhika Rajkumar / ZDNET: Resume Builder survey of 1,342 managers in the US: 60% say they rely on AI to make personnel decisions, 78% of which use the tech in deciding raises  —  A recent survey from Resume Builder finds that half of managers are using AI to make crucial decisions about their direct reports …

12
 
 

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes data from over 100 organizations and challenges conventional thinking by revealing that a small portion of users, just 10 percent, are responsible for nearly 73 percent of all risky behavior in the enterprise. “The riskiest … More → The post Most cybersecurity risk comes from just 10% of employees appeared first on Help Net Security.

13
 
 

A massive network of fraudulent news websites has been uncovered, with cybersecurity researchers identifying over 17,000 Baiting News Sites (BNS) across 50 countries orchestrating sophisticated investment fraud schemes. These malicious platforms masquerade as legitimate news outlets, publishing fabricated stories featuring well-known public figures and respected financial institutions to build trust and lure unsuspecting victims into […] The post BaitTrap – 17,000+ Fake News Websites Caught Promoting Investment Frauds appeared first on Cyber Security News.

14
 
 

Users have reuploaded 5,000 models used to generate nonconsensual sexual content of real people to Hugging Face after they were banned from Civitai.

15
 
 

Gone are the days when all smart devices were required an internet uplink. The WiFi-enabled IoT fad, while still upon us (no, my coffee scale doesn’t need to be on …read more

16
 
 

Abacus Market, the largest Western darknet marketplace supporting Bitcoin payments, has shut down its public infrastructure in a move suspected to be an exit scam. [...]

17
 
 

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. [...]

18
 
 

In the race to develop artificial intelligence, tech giants are building data centers that guzzle up water. That has led to problems for people who live nearby.

19
 
 

Sweden's Moderate party allowed users to make the PM hold a sign bearing any name they wanted. You know what happened next.

20
 
 

Security researchers have uncovered a significant vulnerability in Google Gemini for Workspace that enables threat actors to embed hidden malicious instructions within emails. The attack exploits the AI assistant’s “Summarize this email” feature to display fabricated security warnings that appear to originate from Google itself, potentially leading to credential theft and social engineering attacks. Key […] The post Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails appeared first on Cyber Security News.

21
 
 

AI isn’t just getting into your writing. It’s also getting into your mind and then out of your mouth.

22
 
 

The high-severity flaw could let a hacker abruptly halt — and potentially derail — a train.

23
 
 

Foo Yun Chee / Reuters: The European Commission says that France, Spain, Italy, Denmark, and Greece will test a blueprint for an age verification app meant to protect children online  —  France, Spain, Italy, Denmark and Greece will test a blueprint for an age verification app to protect children online …

24
 
 

MITRE has introduced AADAPT (Adversarial Actions in Digital Asset Payment Technologies), a new cybersecurity framework designed to tackle vulnerabilities in digital financial ecosystems, including cryptocurrency platforms. Modeled after the MITRE ATT&CK framework, AADAPT offers developers, policymakers, and financial institutions a structured approach to identifying, analyzing, and mitigating threats tied to digital asset payment technologies. Drawing on insights from over 150 sources across government, industry, and academia, the framework maps adversarial tactics, techniques, and procedures (TTPs) … More → The post New MITRE framework takes aim at crypto threats appeared first on Help Net Security.

25
 
 

UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts. [...]

view more: next ›