Wed.Aug 16, 2023

article thumbnail

UK Electoral Commission Hacked

Schneier on Security

The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know who was behind the hack. We worked with external security experts and the National Cyber Security Centre to investigate and secure our systems. If the hack was by a major government, the odds are really low that it has resecured its systems—unless it burned the network to the ground and rebuilt it from scratch (which see

Hacking 244
article thumbnail

WordPress Security Checklist

Tech Republic Security

Stories of virus and malware infections, data loss, system compromises and unauthorized access dominate headlines, and your WordPress website may be contributing to the problem. WordPress is the most popular CMS in the world. According to Colorlib, WordPress is used by over 800 million websites worldwide. But unfortunately, that popularity also makes it one of.

Malware 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

The Hacker News

Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part of its OpenSK security keys initiative.

98
article thumbnail

Gartner: Generative AI Will Bring “Transformational Benefit” in the Next 2-5 Years

Tech Republic Security

Generative AI landed on Gartner's coveted Hype Cycle for Emerging Technologies for 2023. Read about AI's transformational impact on business and society.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Two unauthenticated stack buffer overflows found in Ivanti Avalanche EMM

Security Affairs

Ivanti Avalanche EMM product is impacted by two buffer overflows collectively tracked as CVE-2023-32560. Tenable researchers discovered two stack-based buffer overflows, collectively tracked as CVE-2023-32560 (CVSS v3: 9.8), impacting the Ivanti Avalanche enterprise mobility management (EMM) solution. A remote, unauthenticated attacker can trigger the vulnerabilities to execute arbitrary code on vulnerable systems.

Mobile 98
article thumbnail

Get Norton 360 Standard on 2 Devices Plus Identity Theft Protection for $24.99

Tech Republic Security

This exclusive bundle includes online dark web monitoring and identity theft support, so don't miss out on this discounted year-long subscription.

LifeWorks

More Trending

article thumbnail

Quick Glossary: Cybersecurity Countermeasures

Tech Republic Security

Cybersecurity attacks are inevitable for modern businesses. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures. From the glossary: CHECKSUM Refers to a numerical value that is calculated based on the contents of the.

article thumbnail

Approximately 2000 Citrix NetScaler servers were backdoored in a massive campaign

Security Affairs

A threat actor has compromised roughly 2,000 Citrix NetScaler servers exploiting a remote code execution tracked as CVE-2023-3519. In July Citrix warned customers of a critical vulnerability, tracked as CVE-2023-3519 (CVSS score: 9.8), in NetScaler Application Delivery Controller (ADC) and Gateway that is being actively exploited in the wild The vulnerability CVE-2023-3519 (CVSS score: 9.8) is a code injection that could result in unauthenticated remote code execution.

article thumbnail

Beware malware posing as beta versions of legitimate apps, warns FBI

Malwarebytes

The FBI has issued a warning that cybercriminals are embedding malicious code in mobile beta-testing apps in attempts to defraud potential victims. The victims are typically contacted on dating sites and social media, and in some cases they are promised incentives such as large financial payouts. Beta-testing apps are new versions of software that are undergoing their final tests and aren't quite ready to be officially released.

article thumbnail

CISA adds flaw in Citrix ShareFile to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added critical vulnerability CVE-2023-24489 in Citrix ShareFile to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added critical flaw CVE-2023-24489 (CVSS score 9.8) affecting Citrix ShareFile to its Known Exploited Vulnerabilities Catalog. Citrix ShareFile is a secure file sharing and storage platform designed for businesses and professionals to collaborate on documents, exchange files, and manage content in a secure and efficient

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Discord.io confirms theft of 760,000 members' data

Malwarebytes

Discord.io was/is a third party service that enables owners of Discord servers to create customized, personal Discord invites. After a preview of Discord.io's users database was posted on BreachForums, the owners have decided to shut down all Discord.io services "for the foreseeable future." Existing premium subscriptions have been canceled and discord.io promised to reach out as soon as possible on an individual basis.

article thumbnail

Understanding and Recognizing Tech Abuse

SecureWorld News

About the author: Charlotte Hooper is the Helpline Manager at The Cyber Helpline, a U.K. charity and movement by the cybersecurity industry that supports more than 2,000 individuals and sole traders impacted by cybercrime and online harm every month. Technology is increasingly part of our day-to-day life; we use it for communication, work, getting information, and even running our households with smart devices.

article thumbnail

Citrix NetScalers backdoored in widespread exploitation campaign

Malwarebytes

Fox-IT has uncovered a large-scale exploitation campaign of Citrix NetScalers in a joint effort with the Dutch Institute of Vulnerability Disclosure (DIVD). Over 1900 instances were found to have a backdoor in the form of a web shell. These backdoored NetScalers can be taken over at will by an attacker, even when they have been patched and rebooted.

VPN 98
article thumbnail

File sharing site Anonfiles shuts down due to overwhelming abuse

Bleeping Computer

Anonfiles, a popular service for sharing files anonymously, has shut down after saying it can no longer deal with the overwhelming abuse by its users. [.

98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Malvertisers up their game against researchers

Malwarebytes

Threat actors constantly take notice of the work and takedown efforts initiated by security researchers. In this constant game of cat and mouse chasing, tactics and techniques keep evolving from simple to more complex, and more covert. This is a trend we have observed time and time again, no matter the playing field, from exploit kits to credit card skimmers.

Malware 98
article thumbnail

Top 10 Reasons to Choose GlobalSign

GlobalSign

Many businesses are making the switch to GlobalSign as their top PKI provider. Find out why customers have been choosing GlobalSign for over 25 years.

97
article thumbnail

What's the State of Credential theft in 2023?

The Hacker News

At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data to cybercriminals and the evolution of the techniques they use to get hold of it.

article thumbnail

Over 100,000 Hackers Exposed in Data from Top Cybercrime Forums

SecureWorld News

Having your personal information involved in some type of cybersecurity incident or data breach is never fun. It's always a painful process, and it's something that seemingly happens everyday. But how would you feel if those same hackers that exposed your information suddenly had theirs exposed? You'd probably feel some sense of justice, right? Recent research conducted by Hudson Rock has shed light on the extensive compromise of computers and the exposure of hackers within cybercrime forums.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Guide: How Google Workspace-based Organizations can leverage Chrome to improve Security

The Hacker News

More and more organizations are choosing Google Workspace as their default employee toolset of choice. But despite the productivity advantages, this organizational action also incurs a new security debt. Security teams now have to find a way to adjust their security architecture to this new cloud workload. Some teams may rely on their existing network security solutions.

article thumbnail

AI-Powered Fuzzing: Breaking the Bug Hunting Barrier

Google Security

Dongge Liu, Jonathan Metzman, Oliver Chang, Google Open Source Security Team Since 2016, OSS-Fuzz has been at the forefront of automated vulnerability discovery for open source projects. Vulnerability discovery is an important part of keeping software supply chains secure, so our team is constantly working to improve OSS-Fuzz. For the last few months, we’ve tested whether we could boost OSS-Fuzz’s performance using Google’s Large Language Models (LLM).

article thumbnail

Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

The Hacker News

Active flaws in the PowerShell Gallery could be weaponized by threat actors to pull off supply chain attacks against the registry's users.

92
article thumbnail

PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks

Dark Reading

Microsoft is aware of the issue, but so far its attempts to address it don't appear to have worked, the vendor says.

91
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active in-the-wild exploitation. Tracked as CVE-2023-24489 (CVSS score: 9.

article thumbnail

Google released first quantum-resilient FIDO2 key implementation

Bleeping Computer

Google has announced the first open-source quantum resilient FIDO2 security key implementation, which uses a unique ECC/Dilithium hybrid signature schema co-created with ETH Zurich. [.

83
article thumbnail

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

The Hacker News

Multiple critical security flaws have been reported in Ivanti Avalanche, an enterprise mobile device management solution that’s used by 30,000 organizations. The vulnerabilities, collectively tracked as CVE-2023-32560 (CVSS score: 9.8), are stack-based buffer overflows in Ivanti Avalanche WLAvanacheServer.exe v6.4.0.0.

Mobile 86
article thumbnail

QR Code Phishing Campaign Targets Top US Energy Company

Dark Reading

Attackers sent more than 1,000 emails with 2FA, MFA, and other security-related lures aimed at stealing Microsoft credentials.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Major U.S. energy org targeted in QR code phishing attack

Bleeping Computer

A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious emails into inboxes and bypass security.

article thumbnail

Mirai Common Attack Methods Remain Consistent, Effective

Dark Reading

While relatively unchanged, the notorious IoT botnet still continues to drive DDoS.

DDOS 80
article thumbnail

Massive 400,000 proxy botnet built with stealthy malware infections

Bleeping Computer

A new campaign involving the delivery of proxy server apps to Windows systems has been uncovered, where users are reportedly involuntarily acting as residential exit nodes controlled by a private company. [.

Malware 77
article thumbnail

Researchers Harvest, Analyze 100K Cybercrime Forum Credentials

Dark Reading

Researchers found that many Dark Web forums have stronger password rules than most government and military entities.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!