Mon.Jun 17, 2024

article thumbnail

Using LLMs to Exploit Vulnerabilities

Schneier on Security

Interesting research: “ Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.” Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world vulnerabilities when given a description of the vulnerability and toy capture-the-flag problems.

article thumbnail

Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers

WIRED Threat Level

CCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models

The Hacker News

ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors to bypass authentication. Tracked as CVE-2024-3080, the vulnerability carries a CVSS score of 9.8 out of a maximum of 10.0.

article thumbnail

Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

WIRED Threat Level

A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party contractor.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices

The Hacker News

A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located in East Asia for a period of about three years, with the adversary establishing persistence using legacy F5 BIG-IP appliances and using it as an internal command-and-control (C&C) for defense evasion purposes.

article thumbnail

Fake Google Chrome errors trick you into running malicious PowerShell scripts

Bleeping Computer

A new malware distribution campaign uses fake Google Chrome, Word, and OneDrive errors to trick users into running malicious PowerShell "fixes" that install malware. [.

Malware 139

LifeWorks

More Trending

article thumbnail

Why ransomware is still important to business resilience

IT Security Guru

Ransomware may be an old technique, however, due to increasing levels of digital connectivity, are witnessing a proliferation of ransomware attacks in recent years, which pose significant threats to individuals, businesses, and entire industry sectors industries. Ransomware, in its current form, has evolved into a lucrative criminal enterprise, exploiting vulnerabilities in cybersecurity defences worldwide.

article thumbnail

Microsoft Recall delayed after privacy and security concerns

Malwarebytes

Microsoft has announced it will postpone the broadly available preview of the heavily discussed Recall feature for Copilot+ PCs. Copilot+ PCs are personal computers that come equipped with several artificial intelligence (AI) features. The Recall feature tracks anything from web browsing to voice chats. The idea is that Recall can assist users to reconstruct past activity by taking regular screenshots of a user’s activity and storing them locally.

article thumbnail

CVE-2024-37902 (CVSS 10): Critical Flaw in Deep Java Library Opens Door to System Takeover

Penetration Testing

A critical vulnerability (CVE-2024-37902) has been discovered in the Deep Java Library (DJL), a widely-used open-source framework for deep learning projects. The flaw allows attackers to overwrite critical system files, potentially granting them full... The post CVE-2024-37902 (CVSS 10): Critical Flaw in Deep Java Library Opens Door to System Takeover appeared first on Cybersecurity News.

article thumbnail

Online job offers, the reshipping and money mule scams

Security Affairs

Offers that promise easy earnings can also bring with them a host of scams that deceive those who are genuinely seeking income opportunities. Often, behind these enticing offers are pyramid schemes in which profits are generated through the recruitment of new participants, rather than through actual service, sometimes even causing significant financial losses.

Scams 135
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

What is DevSecOps and Why is it Essential for Secure Software Delivery?

The Hacker News

Traditional application security practices are not effective in the modern DevOps world. When security scans are run only at the end of the software delivery lifecycle (either right before or after a service is deployed), the ensuing process of compiling and fixing vulnerabilities creates massive overhead for developers. The overhead that degrades velocity and puts production deadlines at risk.

Software 129
article thumbnail

Empire Market owners charged with operating $430M dark web marketplace

Security Affairs

Federal authorities charged two individuals with operating the dark web marketplace Empire Market that facilitated over $430 million in illegal transactions. Two men, Thomas Pavey (aka “Dopenugget”) and Raheim Hamilton (aka “Sydney” and “Zero Angel”), have been charged in federal court in Chicago for operating the dark web marketplace “ Empire Market ” from 2018 to 2020.

Marketing 131
article thumbnail

iOS Apps Penetration Testing: r2frida for iOS App Runtime Manipulation

Appknox

You might already know a fair bit about r2frida by now - its definition, usage, features, installation, and examples - something we discussed in the previous blog of this series. In case you missed out on it, you can find it here. In this blog, we will explore how r2frida can be instrumental in manipulating an iOS app's runtime.

article thumbnail

Spanish police arrested an alleged member of the Scattered Spider group

Security Affairs

A joint law enforcement operation led to the arrest of a key member of the cybercrime group known as Scattered Spider. Spanish police arrested a 22-year-old British national who is suspected of being a key member of the cybercrime group known as Scattered Spider (also known as UNC3944 , 0ktapus ). The man was arrested in Palma de Mallorca while attempting to fly to Italy, during the arrest, police confiscated a laptop and a mobile phone.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Hackers use F5 BIG-IP malware to stealthily steal data for years

Bleeping Computer

A group of suspected Chinese cyberespionage actors named 'Velvet Ant' are deploying custom malware on F5 BIG-IP appliances to gain a persistent connection to the internal network and steal data. [.

Malware 126
article thumbnail

7000 LockBit Ransomware Decryption Keys Distributed By FBI

Security Boulevard

In a significant move aimed at aiding victims of cyberattacks, the U.S. Federal Bureau of Investigation (FBI) has announced the distribution of more than 7,000 FBI decryption keys associated with the notorious LockBit ransomware decryption. This initiative comes as part of ongoing efforts to mitigate the devastating impact of ransomware attacks on businesses worldwide. […] The post 7000 LockBit Ransomware Decryption Keys Distributed By FBI appeared first on TuxCare.

article thumbnail

Not Just Another 100% Score: MITRE ENGENIUTY ATT&CK

Trend Micro

The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. Trend Micro achieved 100% detection across all 15 major attack steps with an 86% actionable rate for those steps— balancing detections and business priorities including operational continuity and minimized disruption.

article thumbnail

Runtime Enforcement: Software Security After the Supply Chain Ends

Security Boulevard

Runtime enforcement is the future of software security, if we can only make it accessible to the developers that understand their applications the best. The post Runtime Enforcement: Software Security After the Supply Chain Ends appeared first on Security Boulevard.

Software 119
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

CISA Warns of Phone Scammers Impersonating Agency Employees

SecureWorld News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding an ongoing phone-based impersonation fraud campaign where scammers are masquerading as CISA staff. In a brief notification, the agency stated it is "aware of recent impersonation scammers claiming to represent the agency." The CISA warning explicitly states that its employees "will never contact you with a request to wire money, cash, cryptocurrency, or use gift cards and will never instruct you to kee

article thumbnail

Preventative defense tactics in the real world

We Live Security

Don’t get hacked in the first place – it’s much less expensive than dealing with the aftermath of a successful attack.

Hacking 112
article thumbnail

Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting

Cisco Security

Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.

107
107
article thumbnail

LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals

Security Affairs

The County of Los Angeles’ Department of Public Health (DPH) disclosed a data breach that impacted more than 200,000 individuals. The LA County’s Department of Public Health announced that the personal information of more than 200,000 was compromised after a data breach that occurred between February 19 and February 20, 2024. Threat actors obtained the log-in credentials of 53 Public Health employees through a phishing campaign. “Between February 19, 2024, and February 20, 2024, the Los An

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Managing Cloud Security Posture: Continuous Monitoring and Hardening for Visibility and Compliance

Tech Republic Security

Cloud adoption is not slowing down, and neither is the cloud threat landscape. Among many other benefits, the cloud offers increased productivity and flexibility, as well as reduced infrastructural costs. However, despite delivering many goodies, API endpoints hosted in the cloud can be susceptible to at least 12 security issues. These issues can come in.

103
103
article thumbnail

4 Important Implementations for New Restaurants

SecureBlitz

This post will show you 4 important implementations for new restaurants. Launching a new restaurant is an exciting venture, but it requires careful planning and implementation to ensure success. Every element of your restaurant has the potential to captivate and retain customers, from crafting a menu that entices palates to establishing an inviting environment that […] The post 4 Important Implementations for New Restaurants appeared first on SecureBlitz Cybersecurity.

article thumbnail

7 cool and useful things I do with my Flipper Zero

Zero Day

Forget all the fake Flipper Zero nonsense you see on TikTok. Here are a bunch of very real and impressive things I've used it for.

97
article thumbnail

Photography Supplies: What You Need to Take Great Photos

SecureBlitz

Capturing great photos requires more than just a good eye and creative vision—it also relies on having the right photography supplies at your disposal. Possessing the right tools—from cameras and lenses to lighting fixtures and accessories—can make all the difference in producing amazing outcomes. This comprehensive guide will explore essential photography supplies that every photographer […] The post Photography Supplies: What You Need to Take Great Photos appeared first on SecureBlitz Cy

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A week in security (June 10 – June 16)

Malwarebytes

Last week on Malwarebytes Labs: Truist bank confirms data breach Update now! Google Pixel vulnerability is under active exploitation Adobe clarifies Terms of Service change, says it doesn’t train AI on customer content 23andMe data breach under joint investigation in two countries When things go wrong: A digital sharing warning for couples Google’s Chrome changes make life harder for ad blockers Last week on ThreatDown: 20,000 Fortinet VPN appliances compromised, investigation reveals Patch now!

article thumbnail

Panera Bread likely paid a ransom in March ransomware attack

Bleeping Computer

Panera Bread, an American chain of fast food restaurants, most likely paid a ransom after being hit by a ransomware attack, suggests language used an internal email sent to employees. [.

article thumbnail

Defending your ever-changing attack surface

IT Security Guru

The very elements crucial for a business’s functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas, where external factors come into play, are the least secure, representing vulnerabilities in your organisation’s attack surface.

article thumbnail

Alleged Scattered Spider sim-swapper arrested in Spain

Bleeping Computer

A 22-year-old British national allegedly linked to the Scattered Spider hacking group and responsible for attacks on 45 U.S. companies has been arrested in Palma de Mallorca, Spain. [.

Hacking 86
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!