1 Followers
0 Following
1 Posts

NM Highlands University Confirms Ransomware Incident

https://lemmy.world/post/13966962

NM Highlands University Confirms Ransomware Incident - Lemmy.World

https://www.nmhu.edu/eoc/ [https://www.nmhu.edu/eoc/]

NM Highlands University Confirms Ransomware Incident

https://lemmy.world/post/13966958

NM Highlands University Confirms Ransomware Incident - Lemmy.World

https://www.nmhu.edu/eoc/ [https://www.nmhu.edu/eoc/]

Ransomware attack strikes District Attorney offices across New Mexico

https://lemmy.world/post/13142551

Ransomware attack strikes District Attorney offices across New Mexico - Lemmy.World

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

https://lemmy.world/post/8998871

Bluetooth security flaws reveals all devices launched after 2014 can be hacked - Lemmy.World

Security researchers have discovered new Bluetooth security flaws that allow hackers to impersonate devices and perform man-in-the-middle attacks. The vulnerabilities impact all devices with Bluetooth 4.2 and Bluetooth 5.4, including laptops, PCs, smartphones, tablets, and others. Users can do nothing at the moment to fix the vulnerabilities, and the solution requires device manufacturers to make changes to the security mechanisms used by the technology. Research paper: https://dl.acm.org/doi/pdf/10.1145/3576915.3623066 [https://dl.acm.org/doi/pdf/10.1145/3576915.3623066] Github: https://github.com/francozappa/bluffs [https://github.com/francozappa/bluffs] CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-24023 [https://nvd.nist.gov/vuln/detail/CVE-2023-24023]

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

https://lemmy.world/post/8998834

Bluetooth security flaws reveals all devices launched after 2014 can be hacked - Lemmy.World

Security researchers have discovered new Bluetooth security flaws that allow hackers to impersonate devices and perform man-in-the-middle attacks. The vulnerabilities impact all devices with Bluetooth 4.2 and Bluetooth 5.4, including laptops, PCs, smartphones, tablets, and others. Users can do nothing at the moment to fix the vulnerabilities, and the solution requires device manufacturers to make changes to the security mechanisms used by the technology. Research paper: https://dl.acm.org/doi/pdf/10.1145/3576915.3623066 [https://dl.acm.org/doi/pdf/10.1145/3576915.3623066] Github: https://github.com/francozappa/bluffs [https://github.com/francozappa/bluffs] CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-24023 [https://nvd.nist.gov/vuln/detail/CVE-2023-24023]

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

https://lemmy.world/post/8998501

Bluetooth security flaws reveals all devices launched after 2014 can be hacked - Lemmy.World

* Security researchers have discovered new Bluetooth security flaws that allow hackers to impersonate devices and perform man-in-the-middle attacks. * The vulnerabilities impact all devices with Bluetooth 4.2 and Bluetooth 5.4, including laptops, PCs, smartphones, tablets, and others. * Users can do nothing at the moment to fix the vulnerabilities, and the solution requires device manufacturers to make changes to the security mechanisms used by the technology. Research paper: https://dl.acm.org/doi/pdf/10.1145/3576915.3623066 [https://dl.acm.org/doi/pdf/10.1145/3576915.3623066] Github: https://github.com/francozappa/bluffs [https://github.com/francozappa/bluffs] CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-24023 [https://nvd.nist.gov/vuln/detail/CVE-2023-24023]

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

https://lemmy.world/post/8998372

Bluetooth security flaws reveals all devices launched after 2014 can be hacked - Lemmy.World

* Security researchers have discovered new Bluetooth security flaws that allow hackers to impersonate devices and perform man-in-the-middle attacks. * The vulnerabilities impact all devices with Bluetooth 4.2 and Bluetooth 5.4, including laptops, PCs, smartphones, tablets, and others. * Users can do nothing at the moment to fix the vulnerabilities, and the solution requires device manufacturers to make changes to the security mechanisms used by the technology. Research paper: https://dl.acm.org/doi/pdf/10.1145/3576915.3623066 [https://dl.acm.org/doi/pdf/10.1145/3576915.3623066] Github: https://github.com/francozappa/bluffs [https://github.com/francozappa/bluffs] CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-24023 [https://nvd.nist.gov/vuln/detail/CVE-2023-24023]

Ardent Hospital ER's Disrupted in 6 States After Ransomware Attack

https://lemmy.world/post/8841540

Ardent Hospital ER's Disrupted in 6 States After Ransomware Attack - Lemmy.World

Looks like it hit on Thanksgiving

APD releases suspect photos from shooting incident at Coronado Mall on 11/24/23

https://lemmy.world/post/8726114

APD releases suspect photos from shooting incident at Coronado Mall on 11/24/23 - Lemmy.World

Looks very young

Security Adoption Resources - Security documentation

Guiding organizations through security program modernization with reference strategies built on Zero Trust principles