Tue.Apr 09, 2024

article thumbnail

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

Schneier on Security

US Cyber Safety Review Board released a report on the summer 2023 hack of Microsoft Exchange by China. It was a serious attack by the Chinese government that accessed the emails of senior U.S. government officials. From the executive summary: The Board finds that this intrusion was preventable and should never have occurred. The Board also concludes that Microsoft’s security culture was inadequate and requires an overhaul, particularly in light of the company’s centrality in the technology ecosy

Hacking 268
article thumbnail

April’s Patch Tuesday Brings Record Number of Fixes

Krebs on Security

If only Patch Tuesdays came around infrequently — like total solar eclipse rare — instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to eclipse the number of vulnerabilities fixed in this month’s patch batch — a record 147 flaws in Windows and related software.

DNS 241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Best Open Source Password Managers for Windows in 2024

Tech Republic Security

Discover the top open-source password managers for Windows. Learn about the features and benefits of each to determine which one is the best fit for your needs.

article thumbnail

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

The Hacker News

Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have come under active exploitation in the wild. Of the 149 flaws, three are rated Critical, 142 are rated Important, three are rated Moderate, and one is rated Low in severity.

136
136
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Fortinet Patches Multiple Critical Vulnerabilities Affecting FortiClient, FortiSandbox, FortiOS, and FortiProxy

Penetration Testing

Fortinet has released an urgent security advisory and patches addressing several critical and high-severity vulnerabilities in their popular security products. These vulnerabilities could expose organizations to remote code execution, unauthorized file deletion, OS command... The post Fortinet Patches Multiple Critical Vulnerabilities Affecting FortiClient, FortiSandbox, FortiOS, and FortiProxy appeared first on Penetration Testing.

article thumbnail

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

The Hacker News

Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass authorization and gain root access on the devices. The findings come from Romanian cybersecurity firm Bitdefender, which discovered and reported the flaws in November 2023. The issues were fixed by LG as part of updates released on March 22, 2024.

More Trending

article thumbnail

FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars

Security Boulevard

To protect domestic violence survivors from abusers, the FCC wants to include internet-connected vehicles under the Safe Communication Act. The post FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars appeared first on Security Boulevard.

Internet 128
article thumbnail

Over 90,000 LG Smart TVs may be exposed to remote attacks

Bleeping Computer

Security researchers at Bitdefender have discovered four vulnerabilities impacting multiple versions of WebOS, the operating system used in LG smart TVs. [.

134
134
article thumbnail

Over 91,000 LG smart TVs running webOS are vulnerable to hacking

Security Affairs

Researchers found multiple vulnerabilities in LG webOS running on smart TVs that could allow attackers to gain root access to the devices. Bitdefender researchers discovered multiple vulnerabilities in LG webOS running on smart TVs that could be exploited to bypass authorization and gain root access on the devices. The vulnerabilities discovered by the researchers impact WebOS versions 4 through 7 running on LG TVs. “WebOS runs a service on ports 3000/3001 (HTTP/HTTPS/WSS) which is used by

Hacking 125
article thumbnail

Microsoft fixes two Windows zero-days exploited in malware attacks

Bleeping Computer

Microsoft has fixed two actively exploited zero-day vulnerabilities during the April 2024 Patch Tuesday, although the company failed to initially tag them as such. [.

Malware 129
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google announces V8 Sandbox to protect Chrome users

Security Affairs

Google announced support for a V8 Sandbox in the Chrome web browser to protect users from exploits triggering memory corruption issues. Google has announced support for what’s called a V8 Sandbox in the Chrome web browser. The company included the V8 Sandbox in Chrome’s Vulnerability Reward Program (VRP). Chrome 123 is a sort of “beta” release for the sandbox designed to mitigate memory corruption issues in the Javascript engine.

article thumbnail

Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs

Bleeping Computer

Today is Microsoft's April 2024 Patch Tuesday, which includes security updates for 150 flaws and sixty-seven remote code execution bugs.

140
140
article thumbnail

Techstrong Group Announces Rebranding of Security Bloggers Network to Security Creators Network

Security Boulevard

BOCA RATON, FL, April 9, 2024 — Techstrong Group, the power source for people and technology, is excited to announce the rebranding of the renowned Security Bloggers Network to the Security Creators Network. With over 350 security-focused content creators, the network has been a staple in the cybersecurity community for the past two decades. The. The post Techstrong Group Announces Rebranding of Security Bloggers Network to Security Creators Network appeared first on Security Boulevard.

article thumbnail

Critical Rust flaw enables Windows command injection attacks

Bleeping Computer

Threat actors can exploit a security vulnerability in the Rust standard library to target Windows systems in command injection attacks. [.

139
139
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks

The Hacker News

A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks. The vulnerability, tracked as CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with untrusted arguments.

115
115
article thumbnail

New SharePoint flaws help hackers evade detection when stealing files

Bleeping Computer

Researchers have discovered two techniques that could enable attackers to bypass audit logs or generate less severe entries when downloading files from SharePoint. [.

125
125
article thumbnail

Patch Tuesday Update – April 2024

Security Boulevard

For April 2024, Microsoft has rolled out a significant update aimed at bolstering the security and performance of its product suite. In this month’s release, users and IT administrators are encouraged to prioritize these updates to protect their systems from known vulnerabilities and cyber threats. Key Highlights from April’s Patch Tuesday: Total Updates: This month, … Read More The post Patch Tuesday Update – April 2024 appeared first on Security Boulevard.

article thumbnail

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

The Hacker News

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets.

Phishing 112
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

LazyStealer Malware Targets Governments with Simple But Effective Strategy

Penetration Testing

A new report from Positive Technologies Expert Security Center (PT ESC) warns that a cybercriminal group known as “Lazy Koala” has successfully compromised government organizations across several countries. The attackers used a malware strain... The post LazyStealer Malware Targets Governments with Simple But Effective Strategy appeared first on Penetration Testing.

article thumbnail

35-year long identity theft leads to imprisonment for victim

Malwarebytes

Sometimes the consequences of a stolen identity exceed anything you could have imagined. Matthew David Keirans, a 58-year-old former hospital employee has pleaded guilty to assuming another man’s identity since 1988. He was convicted of one count of making a false statement to a National Credit Union Administration insured institution and one count of aggravated identity theft.

article thumbnail

CVE-2024-29988: ‘In-the-Wild’ Flaw Among Microsoft’s April 2024 Patch Tuesday

Penetration Testing

Microsoft’s April 2024 Patch Tuesday release brings a staggering 147 new vulnerability fixes across its software ecosystem. The sheer volume highlights the relentless cybersecurity battle, especially considering reports of a zero-day vulnerability already being... The post CVE-2024-29988: ‘In-the-Wild’ Flaw Among Microsoft’s April 2024 Patch Tuesday appeared first on Penetration Testing.

article thumbnail

Section 702: The Future of the Biggest US Spy Program Hangs in the Balance

WIRED Threat Level

The US Congress will this week decide the fate of Section 702, a major surveillance program that will soon expire if lawmakers do not act. WIRED is tracking the major developments as they unfold.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks

Penetration Testing

A critical vulnerability in the Rust standard library has been uncovered, exposing Windows-based systems to the risk of arbitrary code execution. The flaw, tracked as CVE-2024-24576, could potentially be exploited by attackers to gain... The post CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks appeared first on Penetration Testing.

article thumbnail

Active Nitrogen campaign delivered via malicious ads for PuTTY, FileZilla

Malwarebytes

In the past couple of weeks, we have observed an ongoing campaign targeting system administrators with fraudulent ads for popular system utilities. The malicious ads are displayed as sponsored results on Google’s search engine page and localized to North America. Victims are tricked into downloading and running the Nitrogen malware masquerading as a PuTTY or FileZilla installer.

article thumbnail

“Muddled Libra” Hackers Shift Focus to Cloud and SaaS Attacks

Penetration Testing

In a chilling development that highlights the ever-evolving nature of cyber threats, the infamous “Muddled Libra” hacking group is setting its sights on a new frontier: the cloud and Software-as-a-Service (SaaS). A comprehensive report... The post “Muddled Libra” Hackers Shift Focus to Cloud and SaaS Attacks appeared first on Penetration Testing.

article thumbnail

TechRepublic Academy Is Offering Extra 20% Off Most Deals Through April 16

Tech Republic Security

By using code ENJOY20 at checkout, you will unlock an additional 20% off most deals at TechRepublic Academy. This fantastic offer is available from April 8–16.

Software 106
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

What's the Prescription for Cyber Resilience in Healthcare?

SecureWorld News

Have you noticed that the latest cyberattacks are threatening the very existence of lots of smaller medical clinics and their doctors' ability to deliver care? You might not have because this fact is wildly underreported in the U.S. national mainstream news. Think urgent care centers, cancer treatment, and primary care doctors. And the government is almost powerless to stop these cybercriminals.

article thumbnail

10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet

The Hacker News

A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report shared with The Hacker News.

DDOS 100
article thumbnail

Heimdal® Adds PASM to the World’s Widest Cybersecurity Platform

Heimadal Security

COPENHAGEN, Denmark, April 9, 2024 – Heimdal®, the world’s widest cybersecurity platform with 13 products, is thrilled to announce the launch of its latest innovation, the Privileged Account and Session Management (PASM) solution. Designed to elevate the security of privileged accounts, Heimdal’s PASM grants organizations the ability to meticulously monitor, record, and manage all privileged […] The post Heimdal® Adds PASM to the World’s Widest Cybersecurity Platform appeared

article thumbnail

Cyber Insurance Policy

Tech Republic Security

As the digital landscape becomes more interconnected, it brings with it the growing threat of cyberattacks. The purpose of this policy, written by Maria Carrisa Sanchez for TechRepublic Premium, is to outline the terms and conditions under which the company provides coverage to its employees for losses incurred as a result of cyber-related incidents.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?