Fri.Mar 31, 2023

article thumbnail

German Police Raid DDoS-Friendly Host ‘FlyHosting’

Krebs on Security

Authorities in Germany this week seized Internet servers that powered FlyHosting , a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

DDOS 317
article thumbnail

Study: Women in cybersecurity feel excluded, disrespected

Tech Republic Security

Feelings of exclusion and being disrespected impacts hiring opportunities and retention for women, according to a new report. The post Study: Women in cybersecurity feel excluded, disrespected appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

Bleeping Computer

Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. [.

140
140
article thumbnail

NHS IT systems under disruption threat due to cyber attack on Capita

CyberSecurity Insiders

Capita, an internationally acclaimed business processing & outsourcing firm, is experiencing a sudden halt in the operations of its IT services and suspects a cyber attack behind the disruption. However, the company is yet to reveal it on an official note and assured that it will definitely do so after a detailed investigation gets completed. Those from the company and familiar with the incident state that the incident could be the work of a ransomware gang or some notorious group operating

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

10-year-old Windows bug with 'opt-in' fix exploited in 3CX attack

Bleeping Computer

A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still "opt-in" after all these years. Even worse, the fix is removed after upgrading to Windows 11. [.

138
138
article thumbnail

Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem

CSO Magazine

Several commercial spyware vendors developed and used zero-day exploits against iOS and Android users last year. However, their exploit chains also relied on known vulnerabilities to work, highlighting the importance of both users and device manufacturers to speed up the adoption of security patches. "The zero-day exploits were used alongside n-day exploits and took advantage of the large time gap between the fix release and when it was fully deployed on end-user devices," researchers with Googl

Spyware 117

LifeWorks

More Trending

article thumbnail

World Backup Day: Avoiding a data disaster is a forever topic 

We Live Security

By failing to prepare you are preparing to fail. Make sure you're able to bounce back if, or when, a data disaster strikes.

Backups 115
article thumbnail

Vulkan Playbook Leak Exposes Russia's Plans for Worldwide Cyberwar

Dark Reading

Russian intelligence services, together with a Moscow-based IT company, are planning worldwide hacking operations that will also enable attacks on critical infrastructure facilities.

Hacking 113
article thumbnail

For Cybersecurity, the Tricks Come More Than Once a Year

IT Security Guru

Anyone who pays attention on April Fool’s Day has learned to think twice about the information they read, the links they receive and the people who try impersonating others. The irony, though, is that while we’re hypervigilant against these harmless pranks, malicious actors are trying to play the same types of tricks on us day in and day out. Phishing attacks, malicious links and social engineering are just a few of the tricks used by cybercriminals to obtain credentials and other valuable info

article thumbnail

3CX Supply Chain Attack Campaign

Security Boulevard

On March 29th 2023, CrowdStrike published a blog outlining a supply chain attack leveraging the 3CXDesktopApp - a softphone application from 3CX. The ThreatLabz Team immediately started hunting for IoCs on the Zscaler Cloud. We observed infections dating back to February 2023 for both the Windows as well as the MacOS variant of the Trojanized 3CXDesktopApp installers.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

15 million public-facing services vulnerable to CISA KEV flaws

Bleeping Computer

Over 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in CISA's KEV (known exploitable vulnerabilities) catalog. [.

110
110
article thumbnail

APIs: Driving Innovation, Fueling Security Significance

Security Boulevard

APIs are the driving force of innovation within every organization, but not without a price. APIs enable the seamless connection between customers, vital data and services while allowing engineering teams to quickly iterate with better documentation thanks to standardization. APIs have an immense impact on business value with data standardization and machine compatibility.

article thumbnail

Post-Quantum Satellite Protection Rockets Towards Reality

Dark Reading

A successful multi-orbit cryptography test beamed quantum-agile data up to two different satellites and back down to Earth.

102
102
article thumbnail

Italian privacy regulator bans ChatGPT over collection, storage of personal data

CSO Magazine

Italy’s data privacy regulator has banned ChatGPT over alleged privacy violations relating to the chatbot’s collection and storage of personal data. With immediate effect, the Guarantor for the protection of personal data has ordered the temporary limitation of the processing of data of Italian users by ChatGPT parent firm OpenAI until it complies with EU General Data Protection Regulation (GDPR) privacy laws.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

3CX Supply Chain Attack — Here's What We Know So Far

The Hacker News

Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows and macOS are affected by a supply chain attack. The version numbers include 18.12.407 and 18.12.416 for Windows and 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 for macOS. The company said it's engaging the services of Google-owned Mandiant to review the incident.

Software 101
article thumbnail

3 tips to raise your backup game

Malwarebytes

Happy World Backup Day everyone! What, you didn't know it was World Backup Day? Hmmm, perhaps that's not a surprise. If there was an award for "most overlooked really important thing in computing", backups would win. Every year. So let's put that right this year and spend a minute or two of World Backup Day thinking about backups. Backups are great!

Backups 98
article thumbnail

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

The Hacker News

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems. This entails the abuse of CVE-2022-46169 (CVSS score: 9.8) and CVE-2021-35394 (CVSS score: 9.8) to deliver MooBot and ShellBot (aka PerlBot), Fortinet FortiGuard Labs said in a report published this week.

Hacking 100
article thumbnail

Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin

Security Affairs

Threat actors are actively exploiting a high-severity flaw in the Elementor Pro WordPress plugin used by more than eleven million websites WordPress security firm PatchStack warns of a high-severity vulnerability in the Elementor Pro WordPress plugin that is currently being exploited by threat actors in the wild. Elementor Pro is a paid plugin that is currently installed on over 11 million websites, it allows users to easily create WordPress websites.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain Attack

Heimadal Security

An ongoing supply chain attack allegedly uses a digitally signed and trojanized variant of the 3CX Voice Over Internet Protocol (VoIP) desktop client to target the company’s clients. The 3CX Phone System engineered by the VoIP IPBX software development company 3CX is utilized daily by over 12 million users and over 600,000 companies, including high-profile […] The post Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain Attack appeared first on Heimdal Security Blog.

article thumbnail

Russian APT group Winter Vivern targets email portals of NATO and diplomats

Security Affairs

Russian hacking group Winter Vivern has been actively exploiting Zimbra flaws to steal the emails of NATO and diplomats. A Russian hacking group, tracked Winter Vivern (aka TA473), has been actively exploiting vulnerabilities ( CVE-2022-27926 ) in unpatched Zimbra instances to gain access to the emails of NATO officials, governments, military personnel, and diplomats.

article thumbnail

6 Tips for Small Business Enterprises to Safeguard Their Websites from Attackers

GlobalSign

In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.

article thumbnail

Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33M

Security Affairs

The Cyber Police of Ukraine, with law enforcement officials from Czechia, has arrested several members of a gang responsible for $4.33 million scam. The Cyber Police of Ukraine, with the support of law enforcement officials from the Czech Republic, has arrested several members of a cybercriminal ring that defrauded EU citizens of $4.33 million with phishing campaigns.

Banking 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Smart Grid Fragility, a Constant Threat for the European and American Way of Living

Heimadal Security

In today’s world, a multitude of smart devices helps us to improve our lives, as we rely more and more on technology for a comfortable and efficient lifestyle – smart appliances, smart cars, smartwatches. Life as we know it is possible thanks to all of these working together for us and with us. But how […] The post Smart Grid Fragility, a Constant Threat for the European and American Way of Living appeared first on Heimdal Security Blog.

article thumbnail

Noname Security Extends Reach of API Security Platform

Security Boulevard

Noname Security this week extended the reach of its platform for securing application programming interfaces (APIs) to make it easier to discover APIs and visualize the workflows that revolve around them. Specifically, the company has added to the Noname Security Runtime Protection platform an ability to customize discovery and more flexibly apply tags to track.

article thumbnail

NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern

Heimadal Security

Winter Vivern (aka TA473), a Russian hacking group, has been exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra instances to access the emails of NATO officials, governments, military people, and diplomats. The CVE-2022-27926 flaw affects versions 9.0.0 of Zimbra Collaboration, which is used to host webmail portals with public access. The attackers can also exploit compromised accounts […] The post NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern a

article thumbnail

Twitter Presses GitHub to Turn Over User Who Leaked Source Code

Security Boulevard

When Twitter joined the ranks of tech companies whose source code leaked online, it was met with little surprise and a whole lot of unease over what the leak might mean for the platform’s security. “Unlike other recent source code leaks, it is concerning that Twitter has not released a statement to reiterate that it. The post Twitter Presses GitHub to Turn Over User Who Leaked Source Code appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Avoiding data backup failures – Week in security with Tony Anscombe

We Live Security

Today is World Backup Day, but maybe we also need a "did you test your backups" day?

Backups 97
article thumbnail

Best Practices for Effective Identity Lifecycle Management (ILM)

Heimadal Security

In today’s fast-paced world, identity management has become a crucial aspect of every organization. From securing sensitive data to ensuring compliance with regulations, effective Identity Lifecycle Management (ILM) is essential for businesses of all sizes. However, implementing an ILM strategy can be challenging without proper guidance and knowledge.

97
article thumbnail

Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam

The Hacker News

The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members of a cybercriminal gang that set up phishing sites to target European users. Two of the apprehended affiliates are believed to be organizers, with 10 others detained in other territories across the European Union.

article thumbnail

US Space Force Requests $700M for Cybersecurity Blast Off

Dark Reading

Russia's invasion of Ukraine spurs Space Force to seek astronomical investments in cybersecurity.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!