Mon.Nov 11, 2024

article thumbnail

Amazon discloses employee data breach after May 2023 MOVEit attacks

Security Affairs

Amazon disclosed a data breach exposing employee data, with information allegedly stolen in the May 2023 MOVEit attacks. Amazon disclosed a data breach that exposed employee information after data was allegedly stolen during the May 2023 MOVEit attacks. The company said that the data was stolen from a third-party vendor. Amazon did not disclose the number of impacted employees.

article thumbnail

GUEST ESSAY: The promise and pitfalls of using augmented reality– ‘AR’ — in cybersecurity

The Last Watchdog

Augmented reality use cases have become prevalent in our society. The technology, which first emerged primarily in the world of gaming and entertainment, now promises to reshape our reality with interactive information and immersive experiences. In short, AR is undoubtedly a groundbreaking technology that will reinvent how we interact with the digital world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A new fileless variant of Remcos RAT observed in the wild

Security Affairs

Fortinet researchers discovered a new phishing campaign spreading a variant of the commercial malware Remcos RAT. Fortinet’s FortiGuard Labs recently uncovered a phishing campaign spreading a new variant of the Remcos RAT. Remcos is a commercial remote administration tool (RAT) that is sold online to allow buyers remote control over computers. Threat actors use Remcos to steal sensitive information and control victims’ computers for malicious activities.

Phishing 138
article thumbnail

Unpatched Epson Devices at Risk: CVE-2024-47295 Allows Easy Hijacking

Penetration Testing

A newly discovered security vulnerability, CVE-2024-47295, affecting multiple SEIKO EPSON products, could allow attackers to take control of devices with administrative privileges. This issue arises from an insecure initial password... The post Unpatched Epson Devices at Risk: CVE-2024-47295 Allows Easy Hijacking appeared first on Cybersecurity News.

Risk 126
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Lessons Learned from a High-Stakes Data Breach

SecureWorld News

In 2016, Uber faced a cybersecurity crisis that ended up reshaping the conversation around data breaches and accountability. Hackers accessed a massive amount of sensitive data, including the names, email addresses, and phone numbers of 57 million riders and drivers, plus driver's license numbers for about 600,000 drivers. They managed to break in after finding credentials left exposed in a public GitHub repository—a preventable, basic lapse in security hygiene.

article thumbnail

GuLoader Campaign Targets European Industrial Sector with Evolving Evasion Techniques

Penetration Testing

Cado Security Labs has uncovered a targeted GuLoader malware campaign aimed at European industrial and engineering companies. This campaign leverages sophisticated evasion tactics to deliver Remote Access Trojans (RATs), specifically... The post GuLoader Campaign Targets European Industrial Sector with Evolving Evasion Techniques appeared first on Cybersecurity News.

LifeWorks

More Trending

article thumbnail

JavaScript Drive-By Attacks: New Exploits without 0-Day in Google Chrome

Penetration Testing

Ron Masas from Imperva Threat Research has uncovered a new way attackers can target Chrome users without relying on 0-day vulnerabilities. This approach leverages the File System Access API, which... The post JavaScript Drive-By Attacks: New Exploits without 0-Day in Google Chrome appeared first on Cybersecurity News.

article thumbnail

How to apply for the grant scheme to improve SME cybersecurity

BH Consulting

Irish small and medium enterprises selling internationally can avail of a grant scheme to review and update their cybersecurity. The Cyber Security Review Grant scheme subsidises both the cost of an initial assessment and subsequent remediation plan. Here’s how the process works: companies taking part must be clients of Enterprise Ireland, the Government’s agency that supports Irish businesses to development and grow.

article thumbnail

XStream Security Advisory: Denial-of-Service Vulnerability (CVE-2024-47072)

Penetration Testing

A high-severity denial-of-service (DoS) vulnerability has been identified in XStream, a popular Java library used for object serialization. This vulnerability, tracked as CVE-2024-47072 with a CVSSv3 score of 7.5, affects... The post XStream Security Advisory: Denial-of-Service Vulnerability (CVE-2024-47072) appeared first on Cybersecurity News.

article thumbnail

A week in security (November 4 – November 10)

Malwarebytes

Last week on Malwarebytes Labs: Hello again, FakeBat: popular loader returns after months-long hiatus TikTok ordered to close Canada offices following “national security review” Air fryers are the latest surveillance threat you didn’t consider Malwarebytes acquires AzireVPN to fuel additional VPN features and functionalities Large eBay malvertising campaign leads to scams 8 security tips for small businesses Update your Android: Google patches two zero-day vulnerabilities Warning: Ha

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

6 Things to Know About Improving Threat Intelligence Collection

Security Boulevard

Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection practices. 1. How does the disruption to Telegram affect threat actors? After the arrest of Telegram CEO in August 2024, the messaging platform that has been popular […] The post 6 Things to Know About Improving Threat Intelligence Collection appeared first on Flare | Cyber Threat Intel |

article thumbnail

Earth Estries’ Evolving Toolkit: A Deep Dive into Their Advanced Techniques

Penetration Testing

Trend Micro has uncovered details about a sophisticated cyberespionage campaign from Earth Estries, also known as Salt Typhoon. Active since 2020, Earth Estries primarily targets governments and technology firms through... The post Earth Estries’ Evolving Toolkit: A Deep Dive into Their Advanced Techniques appeared first on Cybersecurity News.

article thumbnail

The Urgent Call: How a Phishing Email Pushed Buckeye Elementary to Strengthen Cyber Defenses 

Security Boulevard

In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 techs can use to prepare for hidden digital threats. Guest speakers Sal Franco, IT Director at Buckeye Elementary, and Fran Watkins, Technology Manager at Centennial School District, shared first-hand stories of ransomware and data loss incidents that tested.

article thumbnail

How to migrate from X to Bluesky without losing your followers

Zero Day

This extension lets you easily migrate your follows and block list from X (formerly Twitter) to Bluesky, but you need to act fast because its functionality may be short-lived. Here's why.

145
145
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact

Security Boulevard

API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen finances, and incident response budgets can run into the hundreds of millions. However, other hidden costs often compound the issue, especially if you’re not expecting them. This article will explore the obvious and hidden costs of API breaches, their long-term business [.

59
article thumbnail

Tor Network Thwarts IP Spoofing Attack

Penetration Testing

A coordinated attack targeting the Tor network has been neutralized thanks to the swift action of the Tor community and security researchers. In late October, the Tor Project faced a... The post Tor Network Thwarts IP Spoofing Attack appeared first on Cybersecurity News.

article thumbnail

Ymir: new stealthy ransomware in the wild

SecureList

Introduction In a recent incident response case, we discovered a new and notable ransomware family in active use by the attackers, which we named “Ymir” The artifact has interesting features for evading detection, including a large set of operations performed in memory with the help of the malloc , memmove and memcmp function calls. In the case we analyzed, the attacker was able to gain access to the system via PowerShell remote control commands.

article thumbnail

The AI Machine Gun of the Future Is Already Here

WIRED Threat Level

The Pentagon is pursuing every available option to keep US troops safe from the rising tide of adversary drones, including a robotic twist on its standard-issue small arms.

137
137
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

I changed this Android setting to instantly double my phone speed (and it works on any model)

Zero Day

A few taps and a swipe are all it takes to make your Android phone run in double time.

135
135
article thumbnail

Trojan Malware Delivered via ZIP Concatenation: A New Threat to Windows Users

Penetration Testing

Cybercriminals are always looking for new ways to bypass security defenses, and the latest tactic, as reported by Perception Point, involves using ZIP concatenation to deliver Trojan malware to Windows... The post Trojan Malware Delivered via ZIP Concatenation: A New Threat to Windows Users appeared first on Cybersecurity News.

Malware 75
article thumbnail

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

The Hacker News

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week.

Software 134
article thumbnail

Want a programming job in 2024? Learning any language helps, but only one is essential

Zero Day

Every employment site agrees: Your dream programming job demands this language.

128
128
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

The Hacker News

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness," Russian cybersecurity vendor Kaspersky said.

article thumbnail

Beyond the checkbox: Demystifying cybersecurity compliance

We Live Security

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business

article thumbnail

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

The Hacker News

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality.

article thumbnail

This device proved to me that rugged smartphones can, in fact, have it all

Zero Day

This smartphone has a quad-core processor, a 20-day battery (on standby), and even a 100-megapixel camera!

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

The Hacker News

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. "In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: 'Are Bengal Cats legal in Australia?

Malware 116
article thumbnail

The Apple Watch Series 10 makes a great gift - and just dropped to $349 for the first time at Walmart

Zero Day

The newly-released Apple Watch Series 10 has gotten its biggest price drop yet at Walmart ahead of Black Friday shopping and gifting.

111
111
article thumbnail

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

The Hacker News

Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.

113
113
article thumbnail

I changed 5 ChatGPT settings and instantly became more productive - here's how

Zero Day

Customizing your ChatGPT experience with these simple tips makes every future AI conversation so much more productive.

109
109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!