Sat.Nov 18, 2023

article thumbnail

Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine

Security Affairs

Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB. Check Point researchers observed Russia-linked Gamaredon spreading the worm called LitterDrifter via USB in attacks against Ukraine. Gamaredon (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) has been active since 2014 and its activity focuses on Ukraine, the group was observed using the multistage backdoor Pteranodon / Pterodo.

Malware 120
article thumbnail

Exploit for CrushFTP RCE chain released, patch now

Bleeping Computer

A proof-of-concept exploit was publicly released for a critical remote code execution vulnerability in the CrushFTP enterprise suite, allowing unauthenticated attackers to access files on the server, execute code, and obtain plain-text passwords. [.

Passwords 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The Hacker News

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals.

article thumbnail

Google shares plans for blocking third-party cookies in Chrome

Bleeping Computer

Google has officially announced plans to gradually eliminate third-party cookies, a key aspect of its Privacy Sandbox initiative. [.

Software 123
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Network Segmentation Guide: Essential Security Best Practices Revealed

Security Boulevard

Unlocking the Power of Network Segmentation: A Comprehensive Guide for Enhanced Security In the dynamic world of cybersecurity, network segmentation emerges as a pivotal strategy for safeguarding digital assets. This practice involves dividing a computer network into smaller, distinct segments or subnets. Each subnet acts as a separate entity, enhancing security and control within the … Network Segmentation Guide: Essential Security Best Practices Revealed Read More » The post Network Segmentati

article thumbnail

FCC adopts new rules to protect consumers from SIM-swapping attacks

Bleeping Computer

The Federal Communications Commission (FCC) has revealed new rules to shield consumers from criminals who hijack their phone numbers in SIM swapping attacks and port-out fraud. [.

97

More Trending

article thumbnail

Windows 10 to let admins control how optional updates are deployed

Bleeping Computer

Microsoft announced a new policy that allows admins to control how optional updates are deployed on Windows 10 enterprise endpoints on their networks. [.

82
article thumbnail

The Startup That Transformed the Hack-for-Hire Industry

WIRED Threat Level

Plus: The FBI's baffling inaction on a ransomware group, a massive breach of Danish electric utilities, and more.

Hacking 81
article thumbnail

PoC Code for Linux Kernel Privilege Escalation Flaw (CVE-2023-259) Published

Penetration Testing

Cybersecurity researcher Yordan has released the details, and a proof-of-concept (PoC) exploit for a high-severity vulnerability (CVE-2023-2598, CVSS score of 7.8) that exists in Linux kernel 6.3-rc1. Discovered by white hat hacker Tobias Holl,... The post PoC Code for Linux Kernel Privilege Escalation Flaw (CVE-2023-259) Published appeared first on Penetration Testing.

article thumbnail

Israeli man sentenced to 80 months in prison for providing hacker-for-hire services

Security Affairs

An Israeli hacker has been sentenced to 80 months in prison in the US for his role in a massive spear-phishing campaign. Aviram Azari (52) was sentenced to 80 months in prison for computer intrusion, wire fraud, and aggravated identity theft in connection with his involvement in a massive spear-phishing campaign targeting companies and individuals in the U.S. and around worldwide.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.