Cyber News

NYC Surveillance Cameras Targeted in Amnesty International Crowdsource Project

3 months 3 weeks ago
An online map of surveillance cameras in New York City is in the works. The map project is part of a larger campaign called "Ban the Scan," sponsored by Amnesty International, which is partnering on the initiative with several other tech advocacy, privacy, and civil liberties groups. Data for the map will be "crowdsourced" by volunteers.
John P. Mello Jr.

Avaddon Ransomware Using Ransom DDoS Attacks

3 months 3 weeks ago
Avaddon ransomware actors reportedly launched a DDoS attack against one of its victims' websites to put the victim organizations under pressure of negotiating the ransom payment.

Circular Economy in the High-Tech World

3 months 3 weeks ago
This workshop will convene stakeholders from across the electronics, battery, and solar panel supply chains to assess technical and economic barriers to the reuse, refurbishment, and recycling of these products. The major goal of the workshop is to define NIST’s role in facilitating the transition to a circular economy and identifying actionable items for doing so. Attendees, including manufacturers, researchers, policymakers, industry organizations, and reuse, refurbishing, and recycling practitioners will watch keynote speeches by world-renowned experts in the circular economy, observe panel
Pauline Truong

New Docker Container Escape Bug Affects Microsoft Azure Functions

3 months 3 weeks ago
Cybersecurity researcher Paul Litvak today disclosed an unpatched vulnerability in Microsoft Azure Functions that could be used by an attacker to escalate privileges and escape the Docker container used for hosting them. The findings come as part of Intezer Lab's investigations into the Azure compute infrastructure. Following disclosure to Microsoft, the Windows maker is said to have "determined
Ravie Lakshmanan

Sharp Increase in Emotet, Ransomware Droppers

3 months 3 weeks ago
Ransomware continues to be one of the most impactful threats. Aside from vulnerabilities, its primary delivery method remains phishing emails, with links or attachments containing early-stage loaders.