Hackers exploit a blind spot by hiding malware inside DNS records

Source

Hackers are stashing malware in a place that’s largely out of the reach of most defenses—inside domain name system (DNS) records that map domain names to their corresponding numerical IP addresses. The practice allows malicious scripts and early-stage malware to fetch binary files without having to download …

Engineering Deutsche Telekom's sovereign data platform

Source

Imagine transforming a sprawling, 20-year-old telecommunications data ecosystem, laden with sensitive customer information and bound by stringent European regulations, into a nimble, cloud-native powerhouse. That's precisely the challenge Deutsche Telekom tackled head-on, explains Ashutosh Mishra. By using Google Cloud's Sovereign Cloud offerings, they've built a groundbreaking "One Data Ecosystem …

DOGE Denizen Marko Elez Leaked API Key for xAI

Source

Marko Elez, a 25-year-old employee at Elon Musk’s Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security. So it should fill all Americans with a deep sense …

Nvidia chips become the first GPUs to fall to Rowhammer bit-flip attacks

Source

Nvidia is recommending a mitigation for customers of one of its GPU product lines that will degrade performance by up to 10 percent in a bid to protect users from exploits that could let hackers sabotage work projects and possibly cause other compromises. The move comes in response to …

Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks

Source

PLUS: Bluetooth mess leaves cars exposed; Bitcoin ATMs attacked; Deepfakers imitate US secretary of state Marco Rubio; and more Infosec In Brief Nvidia last week advised customers to ensure they employ mitigations against Rowhammer attacks, after researchers found one of its workstation-grade GPUs is susceptible to the exploit.... [...]

Spring 2025 SOC 1/2/3 reports are now available with 184 services in scope

Source

Amazon Web Services (AWS) is pleased to announce that the Spring 2025 System and Organization Controls (SOC) 1, 2, and 3 reports are now available. The reports cover 184 services over the 12-month period from April 1, 2024, to March 31, 2025, giving customers a full year of assurance …

‘Hacking is assumed now’: experts raise the alarm about added risk of surveillance cameras in childcare centres

Source

As governments consider mandatory CCTV in early education, one big provider with cameras already installed is yet to formalise guidelines for how the footage will be stored and used Get our breaking news email, free app or daily news podcast In the wake of horrifying reports last week alleging …

Louis Vuitton says UK customer data stolen in cyber-attack

Source

Lead brand of French luxury group LVMH reassures customers financial data such as bank details were not taken Louis Vuitton has said the data of some UK customers has been stolen, as it became the latest retailer targeted by cyber hackers. The retailer, the leading brand of the French …

« newer articles | page 25 | older articles »