Fri.Dec 20, 2024

article thumbnail

BellaCPP: Discovering a new BellaCiao variant written in C++

SecureList

Introduction BellaCiao is a.NET-based malware family that adds a unique twist to an intrusion, combining the stealthy persistence of a webshell with the power to establish covert tunnels. It surfaced for the first time in late April 2023 and has since been publicly attributed to the APT actor Charming Kitten. One important aspect of the BellaCiao samples is how they exhibit a wealth of information through their respective PDB paths, including a versioning scheme we were able to work out once we

Malware 130
article thumbnail

The Top 25 Security Predictions for 2025 (Part 1)

Lohrman on Security

As we end the first quarter of the 21st century, cybersecurity threats seem more daunting than ever. So what cyber trends, forecasts, themes, insights and predictions are on offer for the new year? Heres your annual security industry prediction roundup for 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection flaw, tracked as CVE-2024-12356 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

Software 112
article thumbnail

North Korean Hackers Stole $1.34 Billion in Crypto in 2024

Security Boulevard

North Korean hackers stole $1.34 billion in cryptocurrency in 2024, more than half of the $2.2 billion stolen in all crypto hacks, and the attacks by threat groups linked to the rogue nation are becoming more frequent and are happening more quickly. The post North Korean Hackers Stole $1.34 Billion in Crypto in 2024 appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Critical Flaws in Rockwell Automation PowerMonitor 1000 Devices: CVSS Scores Hit 9.8/10

Penetration Testing

Rockwell Automation has issued a critical security advisory highlighting three severe vulnerabilities affecting its PowerMonitor 1000 devices. These vulnerabilities, identified by Vera Mens of Claroty Research – Team82, pose significant... The post Critical Flaws in Rockwell Automation PowerMonitor 1000 Devices: CVSS Scores Hit 9.8/10 appeared first on Cybersecurity News.

article thumbnail

Raccoon Infostealer operator sentenced to 60 months in prison

Security Affairs

Raccoon Infostealer operator Mark Sokolovsky was sentenced to 60 months in US prison and ordered to pay over $910,000 in restitution. The US Department of Justice sentenced the Ukrainian national Mark Sokolovsky (28) for his role in the distribution of the Raccoon Infostealer malware. “Ukrainian national Mark Sokolovsky was sentenced today to 60 months in federal prison for one count of conspiracy to commit computer intrusion.” reads the DoJ’s press release. “As part of h

LifeWorks

More Trending

article thumbnail

Sophos fixed critical vulnerabilities in its Firewall product

Security Affairs

Sophos fixed three Sophos Firewall flaws that could lead to SQL injection, privileged SSH access to devices, and remote code execution. Sophos has addressed three vulnerabilities, respectively tracked as CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729, in its Sophos Firewall solution. The vulnerabilities impact Sophos Firewall v21.0 GA (21.0.0) and older versions, below are the description for these issues: CVE-2024-12727 (CVSS score 9.8) – The vulnerability is a pre-auth SQL injection

article thumbnail

Impart is now available in the AWS Marketplace | Impart Security

Security Boulevard

Today, we are thrilled to announce that Impart is now available in the AWSMarketplace. More Streamlined Contracting AWS customers with existing spend commitments can apply their Impart purchase toward their AWS commitment. This availability simplifies the buying process with streamlined contractual and legal terms, enabling faster procurement. Product Benefits AWScustomers can now more easily purchase Impart to improve their web application and API security, including: Comprehensive WAF and API

article thumbnail

Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware

The Hacker News

The Lazarus Group, an infamous threat actor linked to the Democratic People's Republic of Korea (DPRK), has been observed leveraging a "complex infection chain" targeting at least two employees belonging to an unnamed nuclear-related organization within the span of one month in January 2024.

article thumbnail

AI-Powered Actions Cybersecurity Leaders Are Taking to Outwit Bad Actors

Security Boulevard

As a cybersecurity executive, your job is clear: protect business operations, safeguard consumers and ensure the security of your employees. But in todays rapidly evolving threat landscape, these responsibilities are more challenging than ever. The rise of AI-powered attacks demands that you take decisive, specific actions to not only improve efficiency but also enhance your [] The post AI-Powered Actions Cybersecurity Leaders Are Taking to Outwit Bad Actors appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Want to save your old computer? Try these 6 Linux distros

Zero Day

Here's how to save money, reduce e-waste, and extend the life of your old hardware at the same time.

130
130
article thumbnail

SAML (Security Assertion Markup Language): A Comprehensive Guide

Security Boulevard

Dive into the world of Security Assertion Markup Language (SAML), from its core concepts to practical implementation. Learn how this powerful standard enables secure authentication and single sign-on across different security domains. The post SAML (Security Assertion Markup Language): A Comprehensive Guide appeared first on Security Boulevard.

article thumbnail

7 Android widgets to make your phone or tablet more useful

Zero Day

If you like your Android home screen to give you quick access to information, services, and apps, you should consider adding a small collection of widgets.

130
130
article thumbnail

Tax-Themed Campaign Exploits Windows MSC Files to Deliver Stealthy Backdoor

Penetration Testing

The Securonix Threat Research team has uncovered a sophisticated phishing campaign named FLUX#CONSOLE, leveraging tax-related lures and the use of Windows MSC (Microsoft Management Console) files to deploy a stealthy... The post Tax-Themed Campaign Exploits Windows MSC Files to Deliver Stealthy Backdoor appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to delete your X/Twitter account for good (and protect your data)

Zero Day

Leaving X isn't as simple as logging off. Here's what to do before joining the exodus.

article thumbnail

Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation

The Hacker News

Sophos has released hotfixes to address three security flaws in Sophos Firewall products that could be exploited to achieve remote code execution and allow privileged system access under certain conditions. Of the three, two are rated Critical in severity. There is currently no evidence that the shortcomings have been exploited in the wild.

Firewall 117
article thumbnail

This free AI training from IBM could boost your resume in 10 hours

Zero Day

I spent a weekend earning my digital credential in AI from IBM. The last session was my favorite.

119
119
article thumbnail

Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack

The Hacker News

The developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with cryptocurrency mining malware. Following the discovery, versions 1.1.7 of both libraries have been unpublished from the npm registry.

Malware 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Strengthening Docker Security: Best Practices for Resilient Containers

Cisco Security

Docker's proliferation has led to some serious vulnerabilities, but you can improve security in Docker containers by following a set of best practices.

113
113
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 12/20/24

Security Boulevard

Insight No. 1: Forget the hype. Cloud security is a battlefield, and you're woefully unprepared. Let's cut the crap. Everyone's talking about cloud security, but most organizations are still playing catch-up. You think those cloud providers have your back? Think again. They're too busy raking in profits to worry about your data. So what's a CISO to do?

CISO 52
article thumbnail

Video: Brain Cipher Ransomware Hacks Deloitte

eSecurity Planet

Deloitte has been hacked in a massive data breach attributed to the Brain Cipher ransomware group, exposing 1TB of sensitive information. In this video, our cybersecurity expert dives into the details of the breach, how it happened, and what Deloitte is doing to contain the damage. The post Video: Brain Cipher Ransomware Hacks Deloitte appeared first on eSecurity Planet.

Hacking 106
article thumbnail

OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms

Security Boulevard

OPSWAT this week revealed it has acquired Fend, Inc. to further extend the reach of its cybersecurity portfolio into the realm of operational technology (OT). The post OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

4 ways to be a great digital leader during 2025's tech revolution

Zero Day

AI is just one of the challenges you're facing. Focus on these areas to help your team and the rest of your business excel next year.

100
100
article thumbnail

DEF CON 32 – Measuring the Tor Network

Security Boulevard

Authors/Presenters: Silvia Puglisi, Roger Dingledine Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Measuring the Tor Network appeared first on Security Boulevard.

article thumbnail

Amazon's AI Shopping Guides helps you research less and shop more. Here's how it works

Zero Day

The sheer abundance of deals during the holiday season can get overwhelming. Amazon's guides help US customers navigate more than 100 product types.

100
100
article thumbnail

The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce

Security Boulevard

As artificial intelligence evolves, its impact on cybersecurity and the workforce is profound and far-reaching. Predictive AI once enabled security teams to anticipate threats, and generative AI brought creativity and automation to new levels. Now, we stand at the threshold [] The post The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce appeared first on TechSpective.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

OpenAI unveils its most advanced o3 reasoning model on its last day of 'shipmas'

Zero Day

For 12 days straight, OpenAI unveiled 'new things, big and small.' Here's what's new today and a full round-up of all the announcements.

99
article thumbnail

Diamond Bank Addresses Spoof Websites

Security Boulevard

Diamond Bank is a community bank with 14 branches and thousands of customers in the Southwest Arkansas region. The bank celebrated its 120th anniversary in 2024 and takes great pride in its longevity and connection to the community. Spoof Website Takedown Efforts Prove Difficult Youre just a little bit of rock in the ocean, you [] The post Diamond Bank Addresses Spoof Websites appeared first on Allure Security.

Banking 52
article thumbnail

TP-Link routers may be banned in the US next year - what that means for you

Zero Day

Some of the world's most popular router and modem models have been connected to several high-profile hacking incidents. (Also, they're made in China.

Hacking 94
article thumbnail

ESET Research Podcast: Telekopye, again

We Live Security

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!