Thu.Nov 21, 2024

article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass , MailChimp , Okta , T-Mobile and Twilio. A visual depiction of the attacks by the SMS phishing group known as Scattered Spider, and Oktapus.

article thumbnail

Secret Service Tracking People’s Locations without Warrant

Schneier on Security

This feels important : The Secret Service has used a technology called Locate X which uses location data harvested from ordinary apps installed on phones. Because users agreed to an opaque terms of service page, the Secret Service believes it doesn’t need a warrant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

Security Affairs

Mexico is investigating a ransomware attack targeting its legal affairs office, as confirmed by the president amidst growing cybersecurity concerns. Mexico’s president announced the government is investigating an alleged ransomware hack that targeted the administration’s legal affairs office. “Today they are going to send me a report on the supposed hacking.

article thumbnail

Protecting Critical Infrastructure with Zero-Trust and Microsegmentation

Security Boulevard

Ransomware attacks are increasingly targeting critical infrastructure — essential systems like energy, water, transportation and finance. In 2023 alone, over 40% of attacks hit these sectors, according to the FBI. Meanwhile, agencies like CISA and the UK’s NCSC warn infrastructure companies of mounting threats from state-sponsored adversaries or other malicious actors.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

The U.S. Justice Department charged five suspects linked to the Scattered Spider cybercrime gang with wire fraud conspiracy. The U.S. Justice Department charged five alleged members of the cybercrime gang Scattered Spider (also known as UNC3944 , 0ktapus ) with conspiracy to commit wire fraud. “Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee cr

article thumbnail

Here’s Yet Another D-Link RCE That Won’t be Fixed

Security Boulevard

D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear. The post Here’s Yet Another D-Link RCE That Won’t be Fixed appeared first on Security Boulevard.

Internet 122

LifeWorks

More Trending

article thumbnail

The Crucial Influence of Human Factors in Security Breaches

Security Boulevard

The hard truth is that security breaches often happen because of human mistakes from simple, everyday actions. It's not just employees unknowingly using unsecured Wi-Fi – it's phishing, weak passwords and a lack of awareness that open the door to attackers. The post The Crucial Influence of Human Factors in Security Breaches appeared first on Security Boulevard.

Phishing 114
article thumbnail

Video: Meet Our Cybersecurity Expert, Davin Jackson

eSecurity Planet

Davin Jackson has joined the eSecurity Planet team as our cybersecurity expert and media personality, bringing with him nearly 20 years of experience in tech and cybersecurity. He has helped organizations of various sizes to improve their security against cyber threats. His licenses and certifications include GIAC Web Application Penetration Tester, GIAC Certified Penetration Tester (GPEN), Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker, among others.

article thumbnail

CVE-2024-52940: AnyDesk Vulnerability Exposes User IP Addresses, PoC Published

Penetration Testing

A newly discovered vulnerability in popular remote desktop software AnyDesk could allow attackers to uncover users’ IP addresses, posing significant privacy risks. Security researcher Ebrahim Shafiei identified the flaw (CVE-2024-52940)... The post CVE-2024-52940: AnyDesk Vulnerability Exposes User IP Addresses, PoC Published appeared first on Cybersecurity News.

article thumbnail

Why RBAC is Still a Big Deal in 2024

Security Boulevard

For many experts, the verdict is that RBAC remains a big deal because it delivers on two crucial fronts: It keeps organizations secure while enabling them to remain agile and innovative. In an era of increasingly sophisticated cyberattacks, that’s a combination that’s hard to beat. The post Why RBAC is Still a Big Deal in 2024 appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Apple Patches Two Zero-Day Attack Vectors

Tech Republic Security

Threat actors exploited two vulnerabilities in Intel-based machines. Google’s Threat Analysis Group discovered the flaws.

179
179
article thumbnail

CVE-2024-52067: Sensitive Data Exposed in Apache NiFi Debug Logs

Penetration Testing

A newly discovered vulnerability in Apache NiFi could inadvertently expose sensitive parameter values in debug logs, potentially compromising confidential information. The flaw, tracked as CVE-2024-52067, affects Apache NiFi versions 1.16.0... The post CVE-2024-52067: Sensitive Data Exposed in Apache NiFi Debug Logs appeared first on Cybersecurity News.

article thumbnail

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

The Hacker News

Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer.

article thumbnail

Red Hat Enterprise Linux Lands on Windows Subsystem for Linux

Penetration Testing

Red Hat and Microsoft join forces to bring the leading enterprise Linux distribution to Windows developers. In a move that promises to streamline hybrid cloud development and enhance developer flexibility,... The post Red Hat Enterprise Linux Lands on Windows Subsystem for Linux appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

WIRED Threat Level

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online—no questions asked.

article thumbnail

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

The Hacker News

As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S.

Hacking 137
article thumbnail

Cisco Secure Workload: Leading in Segmentation Maturity

Cisco Security

As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach.

article thumbnail

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online

The Hacker News

New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third of the total exposures. The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.

Internet 131
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

OpenAI updates GPT-4o, reclaiming its crown for best AI model

Zero Day

If you use ChatGPT for writing, you'll be happy to hear this.

122
122
article thumbnail

North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs

The Hacker News

Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme.

article thumbnail

Security researchers identify new malware targeting Linux

We Live Security

ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, as well as to Project Wood.

Malware 111
article thumbnail

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor

The Hacker News

The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That's according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Study of Canadian Business, IT Leaders Reveals Views on GenAI

SecureWorld News

Generative AI is revolutionizing industries, including cybersecurity, by driving innovation, efficiency, and improved outcomes. However, its rapid adoption introduces new risks, requiring businesses to balance opportunities with challenges. A 2024 study by Bell, Canada's largest telecommunications company, surveyed 600 Canadian business leaders and IT professionals to explore the evolving role of GenAI.

article thumbnail

5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

The Hacker News

Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars.

article thumbnail

Even Nvidia's CEO is obsessed with Google's NotebookLM AI tool

Zero Day

Nvidia CEO Jensen Huang spends a lot of time stuffing documents into Google's impressive AI tool. Here's why.

111
111
article thumbnail

Cyber Story Time: The Boy Who Cried "Secure!"

The Hacker News

As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question.

113
113
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

This $200 Motorola comes with a built-in stylus and twice the storage of competing phones

Zero Day

If you enjoy using a stylus to jot down notes, create GIFs, and even solve handwritten calculations, the Moto G Stylus 5G (2024) can be had for just $237 ahead of Black Friday.

110
110
article thumbnail

10 Most Impactful PAM Use Cases for Enhancing Organizational Security

The Hacker News

Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on your IT team. As an established provider of a PAM solution, we’ve witnessed firsthand how PAM transforms organizational security.

Risk 113
article thumbnail

I tried replacing Twitter with Bluesky, Threads, and Mastodon: Here's what I found

Zero Day

More and more ex-Twitter/X users are seeking new online homes. I kicked the tires on these three nascent services. Here's what you need to know about them.

106
106
article thumbnail

Meta Finally Breaks Its Silence on Pig Butchering

WIRED Threat Level

The company gave details for the first time on its approach to combating organized criminal networks behind the devastating scams.

Scams 106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!