Robot dog in dance-off with Korean boy band BTS and other news

Robot dog in dance-off with Korean boy band BTS and other news

BBC Click’s Romana Kreider looks at the best technology news stories of the week including: Elon Musk announced that his satellite internet service Starlink could reach half a million customers over the coming year. MIT and Harvard engineers designed a face mask that can diagnose Covid-19 within about 90 minutes. Boston Dynamics’ robot dog Spot…

Researchers accidentally publish ‘PrintNightmare’ Stuxnet-style zero-day – Security – Software

Researchers accidentally publish ‘PrintNightmare’ Stuxnet-style zero-day – Security – Software

Researchers from a Hong Kong based security vendor accidentally published a proof-of-concept for a new and unpatched vulnerability affecting the Print Spooler service on all current versions of Windows, sparking concerns that ransomware criminals could add the bug to their arsenals. The exploit allows for both local privilege escalation and remote code execution and was…

Windows 11’s Security Push Puts Microsoft on a Collision Course

Windows 11’s Security Push Puts Microsoft on a Collision Course

When Microsoft debuted Windows 11 at the end of last week, the company heralded the usual advancements in efficiency and design that come with any new operating system. But Windows 11 also comes with a less welcome tick: stricter-than-usual hardware requirements for which PCs can actually run it. Because of what Microsoft has described as…

CVE-2021-22380 – Alert Detail – Security Database

CVE-2021-22380 – Alert Detail – Security Database

Executive Summary Informations Name CVE-2021-22380 First vendor Publication 2021-06-30 Vendor Cve Last vendor Modification 2021-06-30 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA   Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…

New Bipartisan Bill Aims to Bolster Federal Cyber Workforce; Sen. Maggie Hassan Quoted

New Bipartisan Bill Aims to Bolster Federal Cyber Workforce; Sen. Maggie Hassan Quoted

Sen. Maggie Hassan Sen. Maggie Hassan, D-N.H., and John Cornyn, R-Texas, have presented a bill that aims to fortify the federal government’s workforce of cyber professionals. The Federal Cybersecurity Workforce Expansion Act would establish two cyber training programs: one with the Cybersecurity and Infrastructure Security Agency (CISA) and the other with the Department of Veterans…

Intelligence agencies detail alleged ‘brute force’ hacking methods used by Russia

Intelligence agencies detail alleged ‘brute force’ hacking methods used by Russia

American and British intelligence agencies said Thursday that Russian military intelligence conducted at least a year-and-a-half-long “brute force” cyber campaign targeting the cloud and network services of U.S. and global organizations. The cyber campaign went after government and military organizations, political parties and consultants, think tanks, law firms, media companies, educational institutions, defense contractors, logistics…

Russians Used Brute Force Attacks Against Hundreds of Orgs: Security Agencies

Russians Used Brute Force Attacks Against Hundreds of Orgs: Security Agencies

Security agencies in the United States and United Kingdom issued an advisory on Thursday to warn organizations about an ongoing global campaign involving brute force techniques. The NSA, CISA, FBI and the UK’s National Cyber Security Centre (NCSC) have attributed the campaign to the Russian government, specifically a cyber espionage group linked to Russia’s General…

Attackers Increasingly Using Cobalt Strike

Attackers Increasingly Using Cobalt Strike

Cybercrime , Fraud Management & Cybercrime , Fraud Risk Management Report: Pen Testing Tool a Favorite Among Lower-Level Threat Groups Doug Olenick (DougOlenick) • June 30, 2021     The solid blue line tracks the number of organizations Proofpoint saw being targeted by attackers using Cobalt Strike. (Source: Proofpoint) The legitimate security penetration testing tool…