Sun.Mar 31, 2024

article thumbnail

Ross Anderson

Schneier on Security

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge. I can’t remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. (Okay, he created both—I helped.

article thumbnail

Cybersecurity Tabletop Exercises: How Far Should You Go?

Lohrman on Security

With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises to test their people, processes and technology?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2024-0582: Serious Linux Kernel Bug Opens Door to System Takeovers, PoC Published

Penetration Testing

The technical details and proof-of-concept (PoC) exploit code has been released for a significant vulnerability, designated CVE-2024-0582 (CVSS 7.8) in the Linux kernel. The flaw, affecting versions 6.4 through 6.6, could allow attackers with local... The post CVE-2024-0582: Serious Linux Kernel Bug Opens Door to System Takeovers, PoC Published appeared first on Penetration Testing.

article thumbnail

DinodasRAT Linux variant targets users worldwide

Security Affairs

A Linux variant of the DinodasRAT backdoor used in attacks against users in China, Taiwan, Turkey, and Uzbekistan, researchers from Kaspersky warn. Researchers from Kaspersky uncovered a Linux version of a multi-platform backdoor DinodasRAT that was employed in attacks targeting China, Taiwan, Turkey, and Uzbekistan. DinodasRAT (aka XDealer ) is written in C++ and supports a broad range of capabilities to spy on users and steal sensitive data from a target’s system.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

The Hacker News

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data.

Banking 135
article thumbnail

xz-utils backdoor: how to get started

Kali Linux

Following the recent disclosure of a backdoor in upstream xz/liblzma , we are writing this “get started” kind of blog post. We will explain how to setup an environment with the backdoored version of liblzma, and then the first commands to run to validate that the backdoor is installed. All in all, it should just take a few minutes, and there’s no learning curve, it’s all very simple.

Internet 131

More Trending

article thumbnail

DinodasRAT malware targets Linux servers in espionage campaign

Bleeping Computer

Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known as XDealer) that may have been operating since 2022. [.

Malware 126
article thumbnail

‘Trojanized’ npm Package Targets Cryptocurrency Wallets, Steals USDT

Penetration Testing

In a startling discovery, the Phylum Research Team has exposed a malicious npm package masquerading as a legitimate toolkit. The package, named “vue2util,” sneakily executes a sophisticated scheme designed to drain USDT tokens from... The post ‘Trojanized’ npm Package Targets Cryptocurrency Wallets, Steals USDT appeared first on Penetration Testing.

article thumbnail

A Ghost Ship’s Doomed Journey Through the Gate of Tears

WIRED Threat Level

Millions lost internet service after three cables in the Red Sea were damaged. Houthi rebels deny targeting the cables, but their missile attack on a cargo ship, left adrift for months, is likely to blame.

Internet 118
article thumbnail

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise

Security Boulevard

The Mend.io research team detected more than 100 malicious packages targeting the most popular machine learning (ML) libraries from the PyPi registry. The post Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise appeared first on Mend. The post Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise appeared first on Security Boulevard.

110
110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apache Fineract Patches Multiple Flaws, Including Critical Privilege Escalation (CVE-2024-23539)

Penetration Testing

Apache Fineract, a widely used open-source core banking solution for financial institutions, has released security patches to address three vulnerabilities, one of which has been classified as ‘critical‘ The vulnerabilities could potentially allow attackers... The post Apache Fineract Patches Multiple Flaws, Including Critical Privilege Escalation (CVE-2024-23539) appeared first on Penetration Testing.

article thumbnail

It's surprisingly difficult for AI to create just a plain white image

Bleeping Computer

Generative AI services like Midjourney and OpenAI's DALL-E can deliver the unimaginable when it comes to stunning artifacts produced from simple text prompts. Sketching complex art imagery may be AI's specialty, yet some of the simplest tasks are evidently what AI struggles with the most. [.

article thumbnail

Hackers Exploit Google Ads to Spread Malware Disguised as Popular Software

Penetration Testing

A new report released by AhnLab Security Intelligence Center (ASEC) uncovers a disturbing tactic hackers are using to spread malware: they’re leveraging Google Ads tracking features to redirect unsuspecting users to malicious websites. Key... The post Hackers Exploit Google Ads to Spread Malware Disguised as Popular Software appeared first on Penetration Testing.

article thumbnail

Cybersecurity Tabletop Exercises: How Far Should You Go?

Security Boulevard

With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises to test their people, processes and technology? The post Cybersecurity Tabletop Exercises: How Far Should You Go? appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Global “Password Spraying” Campaign Targets VPN Systems, Causing Lockouts

Penetration Testing

Cisco has issued a critical warning about a widespread password spraying campaign targeting Remote Access VPN (RAVPN) systems used by businesses worldwide. This surge in attacks aims to overwhelm VPN logins with common passwords,... The post Global “Password Spraying” Campaign Targets VPN Systems, Causing Lockouts appeared first on Penetration Testing.

VPN 100
article thumbnail

New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

Security Boulevard

In episode 323, the hosts discuss two prominent topics. The first segment discusses a significant vulnerability discovered in hotel locks, branded as ‘Unsaflok,’ affecting 3 million doors across 131 countries. The vulnerability allows attackers to create master keys from a regular key, granted access to all doors in a hotel. The co-hosts also discuss the […] The post New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues appeared first on Shared Security Podcast.

article thumbnail

Cookie Theft: The Cybersecurity Threat You Didn’t See Coming

Penetration Testing

Even with strengthened password security and multi-factor authentication (MFA), hackers are finding new ways to break in. A report by CyberArk reveals a sinister trend: the rise of ‘infostealer’ malware specifically designed to steal... The post Cookie Theft: The Cybersecurity Threat You Didn’t See Coming appeared first on Penetration Testing.

article thumbnail

XZ Utils Backdoor Vulnerability (CVE-2024-3094) Advisory

Security Boulevard

Overview NSFOCUS CERT recently detected that a backdoor vulnerability in XZ Utils (CVE-2024-3094) was disclosed from the security community, with a CVSS score of 10. Because the SSH underlying layer relies on liblzma, an attacker could exploit this vulnerability to bypass SSH authentication and gain unauthorized access to affected systems, allowing arbitrary code execution.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Security Affairs newsletter Round 465 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Expert found a backdoor in XZ tools used many Linux distributions German BSI warns of 17,000 unpatched Microsoft Exchange servers Cisco warns of password-spraying attacks targeting Secure Firewall devices American fast-fashion firm Hot Topic hit b

article thumbnail

Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users

Security Boulevard

On March 29, 2024, Red Hat disclosed CVE-2024-3094, scoring a critical CVSS rating of 10. Stemming from a The post Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users appeared first on ARMO. The post Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users appeared first on Security Boulevard.

64