Thu.Jun 08, 2023

article thumbnail

Barracuda Urges Replacing — Not Patching — Its Email Security Gateways

Krebs on Security

It’s not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware — as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks , as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely u

Firmware 339
article thumbnail

Paragon Solutions Spyware: Graphite

Schneier on Security

Paragon Solutions is yet another Israeli spyware company. Their product is called “Graphite,” and is a lot like NSO Group’s Pegasus. And Paragon is working with what seems to be US approval: American approval, even if indirect, has been at the heart of Paragon’s strategy. The company sought a list of allied nations that the US wouldn’t object to seeing deploy Graphite.

Spyware 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

La Cybersécurité Pour Les Nuls 2e Édition: Update To Best-Selling French “Cybersecurity For Dummies” Book Now Available

Joseph Steinberg

The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available in French. Like its first edition counterparts published in several languages, and like the new English-language Second Edition released several months ago, the new French book, La Cybersécurité Pour Les Nuls 2e Édition , is written for general audiences, and can help people of all backgrounds stay cyber-secure, regardless of their technical skillsets.

article thumbnail

Weekly Update 351

Troy Hunt

I spent most of this week's update on the tweaking I went through with Azure's API Management service and then using Cloudflare to stop a whole bunch of requests that really didn't need to go all the way to the origin (or at least all the way to the API gateway sitting in front of the origin Azure Function instance). I'm still blown away by how cool this is - tweak the firewall via a web UI to inspect traffic and respond differently based on a combination of headers and respo

Firewall 238
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cisco LIVE 2023: AI and security platforms innovations take center stage 

Tech Republic Security

At its annual customer event in Las Vegas, Cisco introduced AI-powered, cloud-based products that are designed to snap into its new Security Cloud platform like LEGO. The post Cisco LIVE 2023: AI and security platforms innovations take center stage appeared first on TechRepublic.

article thumbnail

RSAC Fireside Chat: Fusing ‘TIP’ and ‘SOAR’ to defend hybrid-cloud, multi-cloud networks

The Last Watchdog

When Threat Intelligence Platform ( TIP ) and Security Orchestration, Automation and Response ( SOAR ) first arrived a decade or so ago, they were heralded as breakthrough advances. Related: Equipping SOCs for the long haul TIP and SOAR may yet live up to that promise. I had an evocative discussion about this at RSA Conference 2023 with Willy Leichter , vice president of marketing, and Neal Dennis , threat intelligence specialist, at Cyware , which supplies a cyber fusion solution built around a

Marketing 186

LifeWorks

More Trending

article thumbnail

Analyzing the FUD Malware Obfuscation Engine BatCloak

Trend Micro

We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.

article thumbnail

PoC released for Windows Win32k bug exploited in attacks

Bleeping Computer

Researchers have released a proof-of-concept (PoC) exploit for an actively exploited Windows local privilege escalation vulnerability fixed as part of the May 2023 Patch Tuesday. [.

141
141
article thumbnail

Asylum Ambuscade: crimeware or cyberespionage?

We Live Security

A curious case of a threat actor at the border between crimeware and cyberespionage The post Asylum Ambuscade: crimeware or cyberespionage?

137
137
article thumbnail

Microsoft OneDrive down worldwide following claims of DDoS attacks

Bleeping Computer

Microsoft is investigating an ongoing outage that is preventing OneDrive customers from accessing the cloud file hosting service worldwide, just as a threat actor known as 'Anonymous Sudan' claims to be DDoSing the service [.

DDOS 138
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Malware menaces Minecraft mods

Graham Cluley

If you, or your kids, are fans of Minecraft - you might be wise to not download any new mods of plugins for a while. Read more in my article on the Tripwire State of Security blog.

Malware 123
article thumbnail

Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4

Dark Reading

With more than 50,000 publicly leaked OpenAI keys on GitHub alone, OpenAI developer accounts are the third-most exposed in the world.

article thumbnail

Cybersecurity in Manufacturing: Key Threats and Risks

Security Boulevard

Whether it’s production lines halted by a malware attack causing millions of lost revenue, or a cyber-espionage attempt that stealthily infiltrates your network and steals your trade secrets, countless plausible scenarios threaten cybersecurity in manufacturing in the modern hyperconnected, digital age. Arguably, security defenses and awareness still lag behind the pace of digital transformation in manufacturing, where informational and operational.

article thumbnail

Barracuda urges customers to replace vulnerable appliances immediately

CSO Magazine

Enterprise security company Barracuda has warned its customers against using email security gateway (ESG) appliances impacted by a recently disclosed zero-day exploit and to replace them immediately. A patch for the vulnerability, which has been exploited since October 2022, had been issued by Barracuda last month to stop the exploit from allowing ESG backdooring.

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

S3 Ep138: I like to MOVEit, MOVEit

Naked Security

Backdoors, exploits, and Little Bobby Tables. Listen now!

111
111
article thumbnail

Google offers Cryptomining protection of $1 Million if it fails

CyberSecurity Insiders

Google has recently announced a new initiative aimed at protecting users from cryptomining attacks. The company will be offering a Cryptomining Protection Program Cover, which provides a compensation of up to $1 million to users who experience fraudulent usage of their Google Cloud Compute resources resulting in significant operational losses. To be eligible for the program, users must adhere to the terms and conditions outlined in the rule book and file for reimbursement within 30 days of the a

article thumbnail

North Korean APT group targets email credentials in social engineering campaign

CSO Magazine

Researchers warn of a social engineering campaign by the North Korean APT group known as Kimsuky that attempts to steal email credentials and plant malware. The campaign, focused on experts in North Korean affairs, is part of this group's larger intelligence gathering operations that target research centers, think tanks, academic institutions, and news outlets globally.

article thumbnail

Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

The Hacker News

A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Royal Ransomware Gang Bolsters Arsenal with BlackSuit Encryptor

Heimadal Security

The testing phase of BlackSuit, a new encryptor developed by the Royal ransomware gang, has commenced. This encryptor bears striking resemblances to the typical encryptor used by the gang in their operations. Following the shutdown of the infamous Conti operation in June 2022, Royal emerged in January 2023 as its apparent successor. The private ransomware […] The post Royal Ransomware Gang Bolsters Arsenal with BlackSuit Encryptor appeared first on Heimdal Security Blog.

article thumbnail

How to Improve Your API Security Posture

The Hacker News

APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn't come without major risks. Hackers can exploit vulnerabilities in APIs to gain unauthorized access to sensitive data or even take control of the entire system.

Risk 106
article thumbnail

Putin false prey to Deepfake Cyber Attack

CyberSecurity Insiders

A hacker group, potentially associated with the Ukrainian government, allegedly took control of radio and TV broadcasts, using them to transmit a falsified message attributed to Russian President Putin. The fabricated message claimed that the Kremlin planned to impose martial law along the Ukrainian borders, significantly reducing the civil liberties of the population.

article thumbnail

Fraud Prevention Strategies

Security Boulevard

Fraud is a major concern for businesses of all sizes and industries. With the increasing reliance on technology, it has become easier for cybercriminals to target companies and individuals online. This is why it has become imperative for businesses to understand the different types of fraud and the strategies that can be used to prevent […] The post Fraud Prevention Strategies appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Experts Unveil Exploit for Recent Windows Vulnerability Under Active Exploitation

The Hacker News

Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by a threat actor to gain elevated privileges on affected systems. The vulnerability, tracked as CVE-2023-29336, is rated 7.8 for severity and concerns an elevation of privilege bug in the Win32k component.

104
104
article thumbnail

PowerDrop: An Advanced Cyber Threat Targeting Aerospace Industry

SecureWorld News

In a recent breakthrough, cybersecurity firm Adlumin has unveiled the existence of PowerDrop , a highly sophisticated PowerShell script that poses a significant risk to the aerospace defense industry. This malware, named for its elusive nature, combines the techniques commonly associated with both "off-the-shelf" threats and advanced persistent threat (APT) groups.

article thumbnail

City of Dallas Still Clawing Back Weeks After Cyber Incident

Dark Reading

The Texas city's networks have returned to 90% functionality following the May 3 Royal ransomware attack.

article thumbnail

Vivaldi is spoofing Edge Browser to bypass Bing Chat restrictions

Bleeping Computer

The Vivaldi Browser announced today that they are now spoofing Microsoft Edge to bypass browser restrictions Microsoft placed in Bing Chat. [.

Software 103
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cybersecurity Institute to Open in Saudi Arabia

Dark Reading

The Global Cybersecurity Forum branch, which will be in Riyadh, is meant to enable the exchange of ideas and facilitate international projects and partnerships.

article thumbnail

Clop ransomware likely testing MOVEit zero-day since 2021

Bleeping Computer

The Clop ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed file transfer (MFT) solution since 2021, according to Kroll security experts. [.

article thumbnail

Kimsuky Strikes Again: New Campaign Targets Credentials and Intelligence

Heimadal Security

Kimsuky, the notorious North Korean nation-state threat actor, has been linked to a social engineering campaign targeting experts on North Korean affairs in order to steal Google credentials and deliver reconnaissance malware. Using spoofed URLs, websites imitating legitimate web platforms, and Office documents weaponized with ReconShark malware, Kimsuky engages in extensive email correspondence.

article thumbnail

Clop Ransomware Gang Likely Aware of MOVEit Transfer Vulnerability Since 2021

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software's MOVEit Transfer application to drop ransomware.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!