Sat.Mar 09, 2024

article thumbnail

Weekly Update 390

Troy Hunt

Let me begin by quoting Stefan during the livestream: "​​Turns out having tons of data integrity is expensive" Yeah, and working with tons of data in a fashion that's both fast and cost effective is bloody painful. I'm reminded of the old "fast, good and cheap - pick 2" saying, but there's a lot more nuance to it than that, of course.

article thumbnail

sicat: an advanced exploit search tool

Penetration Testing

SiCat – The useful exploit finder SiCat is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively. With a focus on cybersecurity,... The post sicat: an advanced exploit search tool appeared first on Penetration Testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Fortinet FortiOS bug CVE-2024-21762 potentially impacts 150,000 internet-facing devices

Security Affairs

Researchers warn that the critical vulnerability CVE-2024-21762 in Fortinet FortiOS could potentially impact 150,000 exposed devices. In February, Fortinet warned that the critical remote code execution vulnerability CVE-2024-21762 (CVSS score 9.6) in FortiOS SSL VPN was actively exploited in attacks in the wild. The security firm did not provide details about the attacks exploiting this vulnerability.

Internet 138
article thumbnail

Magnet Goblin hackers use 1-day flaws to drop custom Linux malware

Bleeping Computer

A financially motivated hacking group named Magnet Goblin uses various 1-day vulnerabilities to breach public-facing servers and deploy custom malware on Windows and Linux systems. [.

Malware 134
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Threat actors breached two crucial systems of the US CISA

Security Affairs

Threat actors hacked the systems of the Cybersecurity and Infrastructure Security Agency (CISA) by exploiting Ivanti flaws. The US Cybersecurity and Infrastructure Security Agency (CISA) agency was hacked in February, the Recorded Future News first reported. In response to the security breach, the agency had to shut down two crucial systems, as reported by a CISA spokesperson and US officials with knowledge of the incident, according to CNN.

Hacking 134
article thumbnail

Security News This Week: Russian Hackers Stole Microsoft Source Code—and the Attack Isn’t Over

WIRED Threat Level

Plus: An ex-Google engineer gets arrested for allegedly stealing trade secrets, hackers breach the top US cybersecurity agency, and X’s new feature exposes sensitive user data.

More Trending

article thumbnail

Muddled Libra Threat Group: A Formidable Threat to the Modern Enterprise

Penetration Testing

The threat landscape is a constantly shifting battlefield, and among the ranks of dangerous actors, one name stands out: Muddled Libra. This group epitomizes the potent intersection of social engineering prowess and rapid technology... The post Muddled Libra Threat Group: A Formidable Threat to the Modern Enterprise appeared first on Penetration Testing.

article thumbnail

USENIX Security ’23 – “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security

Security Boulevard

Authors/Presenters: Jonas Hielscher. Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

CISO 62