Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
Cybersecurity Researchers Launch New Malware Hunting Tool YARAify
The defensive tool is designed to scan suspicious files against a large repository of YARA rules
New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack
Successful exploitation would give an attacker access to all emails on a compromised server
Amazon Fixes High Severity Vulnerability in Amazon Photos Android App
The vulnerability derived from a misconfiguration of one of the Photos app’s components
Space Force mulls new acquisition approach for next phase of medium, heavy launches
The Space Force hasn’t finalized its plans for Phase 3 of its National Security Space Launch program, but its new acquisition executive said this week it is considering the possibility of including more launch vehicle classes as part of the contract.
Chinese Influence Op Tries to Undermine Western Rare Earth Firms
Micro-targeting of local users a first for Beijing
FBI: Beware Deepfakes Used to Apply for Remote Jobs
Feds warn of fraudulent attempts to land work
Ransomware Suspected in Wiltshire Farm Foods Attack
Food manufacturer reveals system outage
US Army awards $72 million for new phase in next-gen ground system effort
The Army awarded Palantir Technologies and Raytheon Technologies $36 million each to turn their TITAN designs into prototypes, and the service plans to choose a single provider at the end of the 14-month phase.
Nearly One Million Exposed Misconfigured Kubernetes Instances Could Cause Breaches
Misconfiguration practices might make companies lucrative targets for threat actors