Sat.Jan 06, 2024

article thumbnail

Experts spotted a new macOS Backdoor named SpectralBlur linked to North Korea

Security Affairs

Researchers discovered a macOS backdoor, called SpectralBlur, which shows similarities with a North Korean APT’s malware family. Security researcher Greg Lesnewich discovered a backdoor, called SpectralBlur, that targets Apple macOS. The backdoor shows similarities with the malware family KANDYKORN (aka SockRacket), which was attributed to the North Korea-linked Lazarus sub-group known as BlueNoroff (aka TA444 ).

Malware 130
article thumbnail

Google: Malware abusing API is standard token theft, not an API issue

Bleeping Computer

Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen ones have expired. [.

Malware 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Merck settles with insurers regarding a $1.4 billion claim over NotPetya damages

Security Affairs

Merck has resolved a dispute with insurers regarding a $1.4 billion claim arising from the NotPetya malware incident. Merck and its insurers have agreed with a $1.4 billion claim arising from the large-scale NotPetya cyberattack. Merck & Co., Inc., known as Merck Sharp & Dohme (MSD) outside the United States and Canada, is an American multinational pharmaceutical company.

Insurance 117
article thumbnail

X users fed up with constant stream of malicious crypto ads

Bleeping Computer

Cybercriminals are abusing X advertisements to promote websites that lead to crypto drainers, fake airdrops, and other scams. [.

Scams 132
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Law firm Orrick data breach impacted 638,000 individuals

Security Affairs

Law firm Orrick, Herrington & Sutcliffe disclosed a data breach that took place in early 2023, which impacted roughly 600,000 individuals. The law firm Orrick, Herrington & Sutcliffe, disclosed a data breach that impacted 638,000 individuals. An authorized actor gained access to the company network between February 28 and March 13. The intruders gained access to a storage containing files related to the clients of the law firm.

article thumbnail

DynastyPersist: A Linux persistence tool

Penetration Testing

DynastyPersist A CTF Tool for Linux persistence (KOTH, Battlegrounds) A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This script provides a collection of features that demonstrate different... The post DynastyPersist: A Linux persistence tool appeared first on Penetration Testing.

More Trending

article thumbnail

Decoding the CVE-2023-39296 Vulnerability: A Technical and PoC Analysis

Penetration Testing

The technical details and a proof-of-concept (PoC) were released for the recently patched security flaw, CVE-2023-39296, a critical vulnerability in QNAP’s QTS and QuTS hero operating systems. This flaw rated 7.5 on the CVSS,... The post Decoding the CVE-2023-39296 Vulnerability: A Technical and PoC Analysis appeared first on Penetration Testing.

article thumbnail

Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies

The Hacker News

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a Türkiye-nexus threat actor known as Sea Turtle.

article thumbnail

Cracking the 2023 SANS Holiday Hack Challenge

We Live Security

From ChatNPT to Game Boys and space apps, the 2023 SANS Holiday Hack Challenge took us to the Geese Islands for another rollicking romp of fun

Hacking 86
article thumbnail

FAQ: What Is DFARS Compliance and How Does It Work?

Security Boulevard

The Defense Federal Acquisition Regulation Supplement, better known as DFARS, has significance for contractors working with the Department of Defense (DoD). Our intention is to offer a comprehensive perspective on DFARS in the context of cybersecurity, its various clauses, and the intricacies of maintaining compliance as these rules constantly shift and change over time.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

AIRAVAT - Multifunctional Android GUI RAT With Web Panel | No Port-Forwarding

Hacker's King

We have posted about different RATs (Remote Access Trojan) on our website and some of them require port forwarding and others don't require any port forwarding services. For example Telegram Based RAT , Ahmyth RAT , Lime RAT , etc. In this article, I introduce you to a new web panel-based GUI Android RAT, which is more powerful and easier to handle than many expensive RATs available on the Internet.

article thumbnail

Mastering the Linux CLI: Unleashing the Power of Commands

Security Boulevard

In the ever-evolving landscape of operating systems, Linux stands out as a robust and versatile solution that has captured the hearts of developers and administrators alike. Born from the vision of Linus Torvald in 1991, Linux has transcended its initial educational purpose to become a cornerstone in the digital realm. Today, over 47% of developers […] The post Mastering the Linux CLI: Unleashing the Power of Commands appeared first on Security Boulevard.

article thumbnail

USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’

Security Boulevard

Authors/Presenters: Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons“ Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

article thumbnail

Three Years After January 6th: The Insurrection’s Impact on U.S. Democracy

Security Boulevard

Three years ago, on January 6, 2021, the U.S. Capitol was stormed by a mob intent on overturning the results of the 2020 Presidential Election. This event — the January 6th insurrection — was a direct attack on the democratic process and the peaceful transition of power, a cornerstone of American democracy. As we mark. Continue reading → The post Three Years After January 6th: The Insurrection’s Impact on U.S.

62
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.