By Sergiu Gatlan | March 9. 2023 “AT&T is notifying roughly 9 million customers that some of their information was exposed after a marketing vendor was hacked in January. “Customer Proprietary Network Information from some wireless accounts was exposed, such as the number of lines on an account or wireless rate plan,” AT&T told BleepingComputer. “The […]
America’s Future Series: National Security Dual Use Summit
On March 10, please join our Founder, Jessie Bolton, in attending the 2023 National Security Dual Use Technology Summit – a virtual event that will bring together experts in cybersecurity, space, and defense to share insights and best practices. Comtech is proud to sponsor this event. With the need to stay ahead of the many […]
TikTok car theft challenge: Hyundai, Kia fix flaw
Posted: February 17, 2023 by Jovi Umawing “Car manufacturer Hyundai, and its subsidiary Kia, began rolling out a free software update on February 14, 2023, to address a flaw in their anti-theft software, which was highlighted in a social media challenge. The release of the update came nine months after an uptick in car theft of the affected models in the […]
FBI is investigating a cybersecurity incident on its network
“The U.S. Federal Bureau of Investigation (FBI) is reportedly investigating malicious cyber activity on the agency’s network. The federal law enforcement agency says it already contained the “isolated incident” and is working to uncover its scope and overall impact. “The FBI is aware of the incident and is working to gain additional information,” the U.S. […]
Security News This Week: Hackers Ran Amok Inside GoDaddy for Nearly 3 Years
Plus: The FBI got (at least a little bit) hacked, an election-disruption firm gets exposed, Russia mulls allowing “patriotic hacking,” and more. “GoDaddy revealed in a statement on Thursday it had discovered that hackers inside its systems had installed malware on its network and stolen parts of its code. The company says it became aware […]
New Mirai malware variant infects Linux devices to build DDoS botnet
For the non-technical person, we recommend reading related articles such as this techie finding by Bleeping Computer to discover the how, the why, and the extra bonus of learning something new & uber nerdy. In short — this article explains, “When spreading to other devices, the botnet uses a telnet/SSH brute-forcer that tries to connect […]
Feds Say Cyberattack Caused Suicide Helpline’s Outage
Photo by Getty Images Signature, shylendrahoode “A cyberattack caused a nearly daylong outage of the nation’s new 988 mental health helpline late last year, federal officials told The Associated Press Friday. Lawmakers are now calling for the federal agency that oversees the program to prevent future attacks. “On December 1, the voice calling functionality of […]
Norton LifeLock says thousands of customer accounts breached
By Zack Whittaker, Tech Crunch “Thousands of Norton LifeLock customers had their accounts compromised in recent weeks, potentially allowing criminal hackers access to customer password managers, the company revealed in a recent data breach notice. In a notice to customers, Gen Digital, the parent company of Norton LifeLock, said that the likely culprit was a credential […]
Grounded: Aviation alert system failure should be a wake-up call
By Henry W. Hills, Opinion Contributor at The Hill “Millions of Americans woke up Wednesday morning to find out they weren’t going anywhere. Around 6:30 a.m., the Federal Aviation Administration (FAA) announced that its Notice to Air Missions (NOTAM) system had failed. By 9 a.m. the ground stop was lifted, but the damage was already […]
Cybersecurity demand is already past peak, so it’s time to get selective, Morgan Stanley says
Published By: Wallace Witkowski “Peak cybersecurity demand has passed and investors need to get selective about their stock picks in the sector, as it remains to be seen whether a slowdown in spending is because businesses are gun-shy with a possible recession looming or if they just loaded up early on new services. Morgan Stanley analyst […]