Sat.Mar 16, 2024

article thumbnail

Hackers exploit Aiohttp bug to find vulnerable networks

Bleeping Computer

The ransomware actor 'ShadowSyndicate' was observed scanning for servers vulnerable to CVE-2024-23334, a directory traversal vulnerability in the aiohttp Python library. [.

article thumbnail

Lazarus APT group returned to Tornado Cash to launder stolen funds

Security Affairs

North Korea-linked Lazarus APT group allegedly using again the mixer platform Tornado Cash to launder $23 million. North Korea-linked Lazarus APT group allegedly has reportedly resumed using the mixer platform Tornado Cash to launder $23 million. Blockchain cybersecurity firm Elliptic linked the theft of $112.5 million from exchange HTX , which took place in November 2023, to the North Korea’s group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

The Hacker News

Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by the Microsoft-owned subsidiary.

Software 118
article thumbnail

France Travail data breach impacted 43 Million people

Security Affairs

Unemployment agency France Travail (Pôle Emploi) recently suffered a data breach that could impact 43 million people. On August 2023, the French government employment agency Pôle emploi suffered a data breach and notified 10 million individuals impacted by the security breach. The press release published by the agency states that its information systems are not impacted.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Bluetooth Eavesdropping Threat Exposed: New “BlueSpy” Exploit Targets Popular Headsets

Penetration Testing

A cybersecurity research team has shaken the Bluetooth world at the RootedCon Madrid 2024 conference. Tarlogic Security unveiled “BlueSpy,” a proof-of-concept exploit that demonstrates how popular Bluetooth headsets can be silently turned into eavesdropping... The post Bluetooth Eavesdropping Threat Exposed: New “BlueSpy” Exploit Targets Popular Headsets appeared first on Penetration Testing.

article thumbnail

Scranton School District in Pennsylvania suffered a ransomware attack

Security Affairs

School districts continue to be under attack, schools in Scranton, Pennsylvania, are suffering a ransomware attack. This week, schools in Scranton, Pennsylvania, experienced a ransomware attack, resulting in IT outages. The Scranton School District is working with third-party forensic specialists to investigate the security breach and restore impacted systems.

More Trending

article thumbnail

Automakers Are Telling Your Insurance Company How You Really Drive

WIRED Threat Level

Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator reveals that popular safes contain secret backdoors.

Insurance 101
article thumbnail

VectorKernel: PoCs for Kernelmode rootkit techniques research

Penetration Testing

VectorKernel PoCs for Kernelmode rootkit techniques research or education. Currently focusing on Windows OS. All modules support 64-bit OS only. NOTE Some modules use ExAllocatePool2 API to allocate kernel pool memory. ExAllocatePool2 API is not... The post VectorKernel: PoCs for Kernelmode rootkit techniques research appeared first on Penetration Testing.

article thumbnail

USENIX Security ’23 – Pushed By Accident: A Mixed-Methods Study On Strategies Of Handling Secret Information In Source Code Repositories

Security Boulevard

Authors/Presenters: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

62
article thumbnail

How to Identify & Monitor Insider Threat Indicators [A Guide]

Security Boulevard

How Your Life Events Invite Cyber & Physical Threats The post How to Identify & Monitor Insider Threat Indicators [A Guide] appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.