The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]

  • Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies
    by [email protected] (The Hacker News) on February 24, 2024 at 11:49 am

    Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. "Microsoft will automatically enable the logs in customer accounts and increase the default log retention period from 90 days to 180 days,"

  • Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
    by [email protected] (The Hacker News) on February 23, 2024 at 5:08 pm

    A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years to propagate an information stealer malware called Nova Sentinel. The package, named django-log-tracker, was first published to PyPI in April 2022, according to software supply chain security firm Phylum, which detected an anomalous update to the library on February 21,

  • Microsoft Releases PyRIT - A Red Teaming Tool for Generative AI
    by [email protected] (The Hacker News) on February 23, 2024 at 11:31 am

    Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool) to proactively identify risks in generative artificial intelligence (AI) systems. The red teaming tool is designed to "enable every organization across the globe to innovate responsibly with the latest artificial intelligence advances," Ram Shankar Siva Kumar, AI red team

  • How to Use Tines's SOC Automation Capability Matrix
    by [email protected] (The Hacker News) on February 23, 2024 at 11:29 am

    Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents.  A customizable, vendor-agnostic tool featuring lists of automation opportunities, it's been shared

  • Researchers Detail Apple's Recent Zero-Click Shortcuts Vulnerability
    by [email protected] (The Hacker News) on February 23, 2024 at 5:05 am

    Details have emerged about a now-patched high-severity security flaw in Apple's Shortcuts app that could permit a shortcut to access sensitive information on the device without users' consent. The vulnerability, tracked as CVE-2024-23204 (CVSS score: 7.5), was addressed by Apple on January 22, 2024, with the release of iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, and 

UK Computer Companies - Business Directory Uk - Business listings for computer repair, support and hardware companies Computer Networking, Network Directory - Computer networking solutions providers and companies