This is the definitive text, accompanied by the proposed UNGA resolution and interpretative note, which will be submitted for adoption on Thursday morning. Today’s formal session has been canceled to allow delegations to discuss and find common ground on the remaining areas of disagreement. Delegates need to decide on the final name for the convention. […]
The FBI, along with CISA, advises businesses and organizations to choose software suppliers that prioritize security from the development phase. This approach aims to create a safer software landscape. To assist organizations, the FBI and CISA have released the ‘Secure by Demand Guide’. This document outlines how to evaluate software suppliers’ security practices during procurement. […]
The Canadian government intends to ban the Flipper Zero and similar devices, citing them as tools used by thieves for car theft. The Flipper Zero is a portable pen-testing tool capable of experimenting with and debugging various hardware and digital devices through multiple protocols like RFID, radio, NFC, infrared, and Bluetooth. Users have showcased the […]
Google warns of a novel cyber threat using cloud services as attackers repurpose Google Calendar events for command-and-control (C2) operations. The “Google Calendar RAT” exploit, initially shared on GitHub in June, has caught attention in the cybersecurity community, with 15 forks indicating interest, although not yet observed in active deployment. Cybercriminals are increasingly leveraging legitimate […]
The Federal Communications Commission (FCC) has implemented robust rules on November 15, 2023, to safeguard consumers against scams targeting their cell phone accounts. The rules specifically combat SIM swapping and port-out fraud, shielding users from scammers attempting to manipulate their personal information and data. Scammers often use SIM swapping to fraudulently transfer a victim’s wireless […]
A widespread brand impersonation campaign has been targeting over 100 popular apparel, footwear, and clothing brands since June 2022. The campaign involves approximately 6,000 fake websites across at least 3,000 domains, including inactive ones. Brands such as Nike, Puma, Asics, Vans, Adidas, and many others have been impersonated.The campaign experienced a significant increase in activity […]
Large language models (LLMs), such as ChatGPT, have gained immense popularity and are being rapidly deployed by various organizations.LLMs are trained on large amounts of text-based data and use deep learning to generate human-like text. While LLMs have impressive capabilities, they are not perfect and can make mistakes, hallucinate incorrect facts, and exhibit biases. Concerns […]
The FBI and the US Secret Service NSA have published an updated guide to stop ransomware. The revised guide includes lessons learned from the past few years and additional recommendations to limit the impact of ransomware. The manual describes several steps that are important in preventing ransomware or limiting the impact, such as preparing for […]
Cybercriminals have employed a sophisticated attack method by infecting TP-Link router firmware to target European Union (EU) entities, as reported by Bleeping Computer.The attackers have compromised the firmware of TP-Link routers, a popular brand used widely across Europe, to gain unauthorized access and launch cyberattacks.The infected firmware allows hackers to control the compromised routers remotely, […]
Toyota has exposed the location data of 2.3 million customers for over a decade. The information was accessible due to a security breach in their sales module. The data included customers’ names, email addresses, and vehicle identification numbers (VINs). The breach occurred in Japan, but the data of customers from several countries, including the US […]