Sat.Dec 10, 2022

article thumbnail

Hackers earn $989,750 for 63 zero-days exploited at Pwn2Own Toronto

Bleeping Computer

Pwn2Own Toronto 2022 has ended with competitors earning $989,750 for 63 zero-day exploits (and multiple bug collisions) targeting consumer products between December 6th and December 9th. [.].

126
126
article thumbnail

At least 4,460 vulnerable Pulse Connect Secure hosts are exposed to the Internet

Security Affairs

Censys researchers warn of more than 4,000 vulnerable Pulse Connect Secure hosts exposed to the Internet. Pulse Connect Secure is a widely-deployed SSL VPN solution for remote and mobile users, for this reason, it is a target of attacks by multiple threat actors. Over the years, researchers disclosed several severe vulnerabilities in the server software, in April of 2021, CISA published a report warning of the exploitation of Pulse Connect secure flaws.

Internet 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Air-gapped PCs vulnerable to data theft via power supply radiation

Bleeping Computer

A new attack method named COVID-bit uses electromagnetic waves to transmit data from air-gapped systems isolated from the internet over a distance of at least two meters (6.5 ft), where its captured by a receiver. [.].

article thumbnail

US HHS warns healthcare orgs of Royal Ransomware attacks

Security Affairs

The US Department of Health and Human Services (HHS) warns healthcare organizations of Royal ransomware attacks. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. The Health and Human Services (HHS) is aware of attacks against the Healthcare and Public Healthcare (HPH) sector.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant

The Hacker News

Travel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a broader campaign aimed at legal and financial investment institutions in the Middle East and Europe.

Hacking 88
article thumbnail

Best Antivirus Deals For Christmas 2022

SecureBlitz

Want the best antivirus deals for Christmas 2022? Read on! You don’t want your devices to suffer from a virus or malware infection. For this reason, it’s critical to invest in an excellent antivirus software. So, while you plan to spend money this Christmas season, you can budget for an antivirus. The Christmas season is […]. The post Best Antivirus Deals For Christmas 2022 appeared first on SecureBlitz Cybersecurity.

More Trending

article thumbnail

USENIX Security ’22 – ‘GET /out: Automated Discovery Of Application-Layer Censorship Evasion Strategies’

Security Boulevard

Complete Title : USENIX Security '22 - Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin 'GET /out: Automated Discovery Of Application-Layer Censorship Evasion Strategies'. Our thanks to USENIX for publishing their Presenter’s USENIX Security ’22 Conference tremendous content on the organization’s’ YouTube channel. Permalink. The post USENIX Security ’22 – ‘GET /out: Automated Discovery Of Application-Layer Censorship Evasion Strategies’ appeared first on Security B

article thumbnail

Log4j’s Log4Shell Vulnerability: One Year Later, It’s Still Lurking

WIRED Threat Level

Despite mitigation, one of the worst bugs in internet history is still prevalent—and being exploited.