Sat.Aug 20, 2022

article thumbnail

WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware

Bleeping Computer

WordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the NetSupport RAT and the RaccoonStealer password-stealing Trojan. [.].

DDOS 98
article thumbnail

I am once again asking you to update your Apple devices

Approachable Cyber Threats

Category Vulnerabilities. Risk Level. Apple released a critical security update for iOS, iPadOS and MacOS this week to patch multiple zero-day vulnerabilities. If you read no further, take 10 minutes and update all of your Apple devices today! “A zero what now?” You may remember from another ACT post that vulnerabilities are holes in your electronic devices’ code that when left unpatched, can allow hackers to use them to their advantage; like an open back door on your house.

Risk 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Adds 7 New Actively Exploited Vulnerabilities to Catalog

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday moved to add a critical SAP security flaw to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. The issue in question is CVE-2022-22536, which has received the highest possible risk score of 10.

Risk 94
article thumbnail

Russia's 'Oculus' to use AI to scan sites for banned information

Bleeping Computer

Russia's internet watchdog Roskomnadzor is developing a neural network that will use artificial intelligence to scan websites for prohibited information. [.].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

TA558 cybercrime group targets hospitality and travel orgs

Security Affairs

TA558 cybercrime group is behind a malware campaign targeting hospitality, hotel, and travel organizations in Latin America. Researchers from Proofpoint are monitoring a malware campaign conducted by a cybercrime group, tracked as TA558, that is targeting hospitality, hotel, and travel organizations in Latin America. The group is a small crime threat actor, that has been active since at least April 2018, that employed multiple malware in its attacks, including Loda RAT, Vjw0rm, and Revenge RAT.

article thumbnail

How To Cut Down Your Company’s Costs With Outsourced IT Support

SecureBlitz

Learn how to cut down your company’s costs with outsourced IT support in this post. Companies go through various processes. Read more. The post How To Cut Down Your Company’s Costs With Outsourced IT Support appeared first on SecureBlitz Cybersecurity.

More Trending

article thumbnail

Become a Cybersecurity Expert with 18 New Online Courses @ 98% OFF

The Hacker News

With more data stored in the cloud than ever before, now is a good time to get into cybersecurity. Many top corporations are looking for new talent, and even junior professionals can earn $80,000 or more. The only barrier to entry is education. How do you learn about security protocols and white hat hacking? Enter the All-In-One 2022 Super-Sized Ethical Hacking Bundle.

article thumbnail

Janet Jackson’s ‘Rhythm Nation’ Can Crash Old Hard Drives

WIRED Threat Level

Plus: The Twilio hack snags a reporter, a new tool to check for spyware, and the Canadian weed pipeline gets hit by a cyberattack.

Spyware 98
article thumbnail

Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug

Bleeping Computer

Hackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers. [.].

article thumbnail

Security Affairs newsletter Round 380

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. CISA added 7 new flaws to its Known Exploited Vulnerabilities Catalog TA558 cybercrime group targets hospitality and travel orgs Russia-linked Cozy Bear uses evasive techniques to target Microsoft 365 users CISA added SAP flaw to its Known Exploite

DDOS 75
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

New Grandoreiro Banking Malware Campaign Targeting Spanish Manufacturers

The Hacker News

Organizations in the Spanish-speaking nations of Mexico and Spain are in the crosshairs of a new campaign designed to deliver the Grandoreiro banking trojan.

Banking 80
article thumbnail

ohq2quarto — Rust-Based CLI For Turning Observable Notebooks Into Quarto Projects

Security Boulevard

The previous post had some hacky R code to grab seekrit JSON data in ObservableHQ (OHQ) Notebooks and spit out a directory with a Quarto qmd and any associated FileAttachments. Holding firm to my “no more generic public R packages” decree, that’s as far as the R code for that utility is going to get. Continue reading ?. The post ohq2quarto — Rust-Based CLI For Turning Observable Notebooks Into Quarto Projects appeared first on Security Boulevard.

52
article thumbnail

BSidesTLV 2022 – Gal Bitensky’s ‘SS-Oh No!’

Security Boulevard

Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesTLV 2022 – Gal Bitensky’s ‘SS-Oh No!’ appeared first on Security Boulevard.

article thumbnail

BSidesTLV 2022 – Asaf Eitani’s & Itamar Maouda Kochavi’s ‘Hunting Kernel Rootkits With eBPF’

Security Boulevard

Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesTLV 2022 – Asaf Eitani’s & Itamar Maouda Kochavi’s ‘Hunting Kernel Rootkits With eBPF’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.