Sun.Feb 18, 2024

article thumbnail

Generative AI Guardrails: How to Address Shadow AI

Lohrman on Security

New terminology and cyber questions about generative artificial intelligence keep popping up. Can AI be governed? How can GenAI be secured? By whom? Using what tools and processes?

article thumbnail

ESET fixed high-severity local privilege escalation bug in Windows products

Security Affairs

Cybersecurity firm ESET has addressed a high-severity elevation of privilege vulnerability in its Windows security solution. ESET addressed a high-severity vulnerability, tracked as CVE-2024-0353 (CVSS score 7.8), in its Windows products. The vulnerability is a local privilege escalation issue that was submitted to the company by the Zero Day Initiative (ZDI).

Antivirus 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker arrested for selling bank accounts of US, Canadian users

Bleeping Computer

Ukraine's cyber police arrested a 31-year-old for running a cybercrime operation that gained access to bank accounts of American and Canadian users and sold it on the dark web. [.

Banking 128
article thumbnail

SolarWinds addressed critical RCEs in Access Rights Manager (ARM)

Security Affairs

SolarWinds addressed three critical vulnerabilities in its Access Rights Manager (ARM) solution, including two RCE bugs. SolarWinds has fixed several Remote Code Execution (RCE) vulnerabilities in its Access Rights Manager (ARM) solution. Access Rights Manager (ARM) is a software solution designed to assist organizations in managing and monitoring access rights and permissions within their IT infrastructure.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Does moving to the cloud mean compromising on security?

Security Boulevard

Cloud security means multiple teams with a shared responsibility. The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations. Cloud services offer recognised advantages, such as moving IT infrastructure costs to operating expenditure rather than capital expenditure, enhanced governance, and better collaboration, however they also introduce specific security considerations that need to be

article thumbnail

CVE-2023-32462 (CVSS 9.8): Patch Dell Switches to Block Takeover

Penetration Testing

If your data center relies on Dell SmartFabric OS10, a security checkup is non-negotiable. Recently disclosed vulnerabilities (CVE-2023-28078 and CVE-2023-32462) pose a severe threat. They range from sensitive data exposure, and service disruption, all... The post CVE-2023-32462 (CVSS 9.8): Patch Dell Switches to Block Takeover appeared first on Penetration Testing.

More Trending

article thumbnail

Critical Ghostscript Vulnerability Exposes Systems: Immediate Update Recommended

Penetration Testing

IT professionals and security-conscious users should take note of a critical vulnerability (CVE-2020-36773) found in older versions of Ghostscript, a software interpreter widely used for handling PostScript and PDF files. Successful exploitation of this... The post Critical Ghostscript Vulnerability Exposes Systems: Immediate Update Recommended appeared first on Penetration Testing.

article thumbnail

Security Affairs newsletter Round 459 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Ukrainian national faces up to 20 years in prison for his role in Zeus, IcedID malware schemes CISA: Cisco ASA/FTD bug CVE-2020-3259 exploited in ransomware attacks CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vul

article thumbnail

DDoS Evolves: 2023 Trends Reveal Attackers Shift Tactics, Target E-commerce

Penetration Testing

2023 was a year of marked transformation in the world of Distributed Denial of Service (DDoS) attacks. Qrator Labs’ extensive report exposed several alarming developments: the strategic weaponization of DDoS as a commercial tool,... The post DDoS Evolves: 2023 Trends Reveal Attackers Shift Tactics, Target E-commerce appeared first on Penetration Testing.

DDOS 123
article thumbnail

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

The Hacker News

The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with a new backdoor called BASICSTAR by creating a fake webinar portal.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

“Helpdesk Support” Phishing Campaign Targets Outlook Credentials

Penetration Testing

The Italian Computer Security Incident Response Team (CSIRT) has issued a critical warning about a resurgence of the “Helpdesk Support” phishing campaign. This sophisticated attack employs deceptive emails designed to extract Microsoft Outlook login... The post “Helpdesk Support” Phishing Campaign Targets Outlook Credentials appeared first on Penetration Testing.

Phishing 113
article thumbnail

The Danger Lurking Just Below Ukraine's Surface

WIRED Threat Level

The widespread use of mines has left Ukrainians scrambling to find ways to clear the explosives. New efforts to develop mine-clearing technology may help them push back Russia's invading forces.

article thumbnail

FullBypass: bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode)

Penetration Testing

FullBypass A tool that bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Usage: First, Download the bypass.csproj file into the victim machine (Find... The post FullBypass: bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) appeared first on Penetration Testing.

article thumbnail

A week in security (February 12 – February 18)

Malwarebytes

Last week on Malwarebytes Labs: GoldPickaxe Trojan steals your face! Microsoft Exchange vulnerability actively exploited Massive utility scam campaign spreads via online ads Facebook Marketplace users’ stolen data offered for sale How ransomware changed in 2023 Malwarebytes crushes malware all the time Update now! Microsoft fixes two zero-days on February Patch Tuesday TheTruthSpy stalkerware, still insecure, still leaking data Remote Monitoring & Management software used in phishing attacks

Scams 75
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CVE-2024-21915 (CVSS 9.0): Rockwell Automation Patches Critical Flaw in FTSP

Penetration Testing

A recently disclosed privilege escalation flaw (CVE-2024-21915) with a critical CVSS score of 9.0 exists in Rockwell’s FactoryTalk Service Platform (FTSP). CISA advises applying the vendor’s patch and mitigations immediately. Unchecked, this could allow... The post CVE-2024-21915 (CVSS 9.0): Rockwell Automation Patches Critical Flaw in FTSP appeared first on Penetration Testing.

article thumbnail

The Cybersecurity Risks of Bluetooth

SecureWorld News

Bluetooth has been around since 1994 as a wireless connectivity specification, but the first mobile phones did not appear with basic Bluetooth services until 2001. Throughout the last 20 years, the specification has evolved to allow high fidelity stereo headphones, low power efficiency, and the advanced communications for device synchronization like Apple Carplay and Android Auto.

Risk 75
article thumbnail

Generative AI Guardrails: How to Address Shadow AI

Security Boulevard

New terminology and cyber questions about generative artificial intelligence keep popping up. Can AI be governed? How can GenAI be secured? By whom? Using what tools and processes? The post Generative AI Guardrails: How to Address Shadow AI appeared first on Security Boulevard.

article thumbnail

WhatsApp Defendor - The WhatsApp Exploitation Framework !

Hacker's King

We posted about lots of Hacking or Exploitation frameworks like Socila Engineering Toolkit, Metasploit Framework , QRL Jacker Framework , etc. In this article, I'll introduce you to a new WhatsApp exploitation framework that contains two modules as given below: exploit/windows/whatsapp/session_hijacking exploit/android/whatsapp/grabber_files Module 1: The first module is based on the session hijacking technique in which you can create a fake webpage and trick the victim into scanning the WhatsAp

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Drata vs Vanta Compared: Similarities and Differences 

Security Boulevard

Looking for the best Drata and Vanta alternative? Look no further. Find out how Scytale goes beyond compliance automation. The post Drata vs Vanta Compared: Similarities and Differences appeared first on Scytale. The post Drata vs Vanta Compared: Similarities and Differences appeared first on Security Boulevard.

62
article thumbnail

USENIX Security ’23 – Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang – Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract

Security Boulevard

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel. Permalink The post USENIX Security ’23 – Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang – Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract appeared first on Security B

62