Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped SystemsThe Hacker News
A newly discovered data exfiltration mechanism employs Ethernet cables as a "transmitting antenna" to stealthily siphon highly-sensitive data from air-gapped systems, according to the latest research.
"It's interesting that the wires that came to protect the air-gap become the vulnerability of...
Poorly Configured Apache Airflow Instances Leak Credentials for Popular ServicesThe Hacker News
Cybersecurity researchers on Monday discovered misconfigurations across older versions of Apache Airflow instances belonging to a number of high-profile companies across various sectors, resulting in the exposure of sensitive credentials for popular platforms and services such as Amazon Web Services...
The Shortfalls of Mean Time Metrics in CybersecurityThe Hacker News
Security teams at mid-sized organizations are constantly faced with the question of "what does success look like?". At ActZero, their continued data-driven approach to cybersecurity invites them to grapple daily with measuring, evaluating, and validating the work they do on...
A New APT Hacking Group Targeting Fuel, Energy, and Aviation IndustriesThe Hacker News
A previously undocumented threat actor has been identified as behind a string of attacks targeting fuel, energy, and aviation production industries in Russia, the U.S., India, Nepal, Taiwan, and Japan with the goal of stealing data from compromised networks.
Cybersecurity company...
Acquisizione di tabulati telefonici: che cambia col nuovo decreto-leggeMassimo Borgobello
Data retention e data protection irrompono nelle aule dei tribunali, ricordando che il processo inquisitorio deve comunque cedere al superiore valore giuridico delle fonti Ue. Cosa prevede il decreto legge relativo all’acquisizione dei tabulati telefonici e le conseguenze sui processi...

