Saturday , October 19 2024

infosecbulletin

CISA Releases One Industrial Control Systems Advisory

cyber

CISA published an advisory on May 28, 2024, about Industrial Control Systems (ICS). They share important information about security issues, vulnerabilities, and exploits related to ICS. ICSA-24-149-01 Campbell Scientific CSI Web Server: The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches …

Read More »

ENEA BOLG POST
Cybercriminals exploit top 3 cloud storage for SMS scams

Cloud

Researchers found criminal SMS phishing scam campaigns that exploit cloud storage services like Amazon S3, Google Cloud Storage, Backblaze B2, and IBM Cloud Object Storage. These campaigns, run by unknown threat actors, aim to send SMS messages to redirect users to malicious websites in order to steal their information. According …

Read More »

Chronon: a open-source data platform for AI/ML applications

CHORON

Chronon simplifies data computation and serving for AI/ML apps. Users define data features, and Chronon handles batch and streaming computation, scalable backfills, low-latency serving, correctness, consistency, observability, and monitoring. It allows you to utilize all of the data within your organization, from batch tables, event streams or services to power …

Read More »

Researcher claimed: Biometrics of Indian Forces Exposed

face recognition

Jeremiah Fowler, a security researcher, claimed to discover a major vulnerability in India’s data security. He found an unprotected database with a large amount of biometric data, such as fingerprints, facial scans, and other sensitive information, belonging to millions of Indian citizens. Jeremiah Fowler published his findings on global planet. …

Read More »

NSA Releases Guidance on Zero Trust Maturity

NIST

The NSA released an information sheet called “Advancing Zero Trust Maturity Throughout the Application and Workload Pillar.” This sheet will help organizations protect their applications from unauthorized users and maintain constant visibility of their workload. This CSI gives recommendations for achieving different levels of application and workload capabilities under the …

Read More »

Data protection is sovereignty: Mohammad A. Arafat
INFOCOM Dhaka ends promoting cyber resiliency

infocom

The two day long 7th edition of INFOCOM, India’s biggest business, technology, and leadership event, themed “Sustainable Disruption”, concluded today in Dhaka. The event gathered over 50 speakers from government, business, IT, media, academia, and other leaders from Bangladesh and India. “INFOCOM Dhaka’s main objective is to drive collaborative growth …

Read More »