Thu.Sep 07, 2023

article thumbnail

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Tech Republic Security

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable.

IoT 201
article thumbnail

The International Criminal Court Will Now Prosecute Cyberwar Crimes

WIRED Threat Level

And the first case on the docket may well be Russia’s cyberattacks against civilian critical infrastructure in Ukraine.

Hacking 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that multiple nation-state actors are exploiting security flaws in Fortinet FortiOS SSL-VPN and Zoho ManageEngine ServiceDesk Plus to gain unauthorized access and establish persistence on compromised systems.

VPN 143
article thumbnail

Thousands of dollars stolen from Texas ATMs using Raspberry Pi

Graham Cluley

A Texas court has heard how last month a gang of men used a Raspberry Pi device to steal thousands of dollars from ATMs. Read more in my article on the Tripwire State of Security blog.

Malware 142
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Outlook Hack: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

The Hacker News

Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forge tokens and access Outlook by compromising an engineer’s corporate account. This enabled the adversary to access a debugging environment that contained information pertaining to a crash of the consumer signing system and steal the key.

Hacking 143
article thumbnail

Apple zero-click iMessage exploit used to infect iPhones with spyware

Bleeping Computer

Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain (dubbed BLASTPASS) to deploy NSO Group's Pegasus commercial spyware onto fully patched iPhones. [.

Spyware 142

LifeWorks

More Trending

article thumbnail

How Microsoft's highly secure environment was breached

Malwarebytes

An investigation by Microsoft has finally revealed how China-based hackers circumvented the protections of a "highly isolated and restricted production environment" in May 2023 to unlock sensitive email accounts belonging to US government agencies. The attack was first reported by Microsoft in July , in an article that left some important questions unanswered.

article thumbnail

Alert: Apache Superset Vulnerabilities Expose Servers to Remote Code Execution Attacks

The Hacker News

Patches have been released to address two new security vulnerabilities in Apache Superset that could be exploited by an attacker to gain remote code execution on affected systems. The update (version 2.1.1) plugs CVE-2023-39265 and CVE-2023-37941, which make it possible to conduct nefarious actions once a bad actor is able to gain control of Superset’s metadata database.

142
142
article thumbnail

Apple discloses 2 new actively exploited zero-day flaws in iPhones, Macs

Security Affairs

Apple rolled out emergency security updates to address two new actively exploited zero-day vulnerabilities impacting iPhones and Macs. The two Apple zero-day vulnerabilities, tracked as CVE-2023-41064 and CVE-2023-41061, reside in the Image I/O and Wallet frameworks. CVE-2023-41064 is a buffer overflow issue that was reported by researchers from researchers at Citizen Lab.

Hacking 136
article thumbnail

Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware

The Hacker News

A new malvertising campaign has been observed distributing an updated version of a macOS stealer malware called Atomic Stealer (or AMOS), indicating that it’s being actively maintained by its author. An off-the-shelf Golang malware available for $1,000 per month, Atomic Stealer first came to light in April 2023.

Malware 141
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Two flaws in Apache SuperSet allow to remotely hack servers

Security Affairs

A couple of security vulnerabilities in Apache SuperSet could be exploited by an attacker to gain remote code execution on vulnerable systems. Apache Superset is an open-source Data Visualization and Data Exploration Platform, it is written in Python and based on the Flask web framework. Version 2.1.1 addressed two vulnerabilities, respectively tracked as CVE-2023-39265 and CVE-2023-37941 , that could be exploited to take control of Superset’s metadata database.

Hacking 135
article thumbnail

Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain

Dark Reading

Researchers at Citizen Lab recommend immediately updating any iPhones and iPads to the latest OSes.

129
129
article thumbnail

Zero-days fixed by Apple were used to deliver NSO Group’s Pegasus spyware

Security Affairs

Citizen Lab reported that the actively exploited zero-days fixed by Apple are being used in Pegasus spyware attacks Researchers at Citizen Lab reported that the actively exploited zero-day flaws (CVE-2023-41064 and CVE-2023-41061) fixed by Apple are being used to infect devices with NSO Group ’s Pegasus spyware. According to the researchers, the two vulnerabilities were chained as part of a zero-click exploit, named BLASTPASS, used in attacks on iPhones running the latest version of iOS (16.6).

Spyware 132
article thumbnail

How Easy is Email Encryption? You’d Be Surprised.

Webroot

When it comes to keeping sensitive data safe, email encryption is a necessity. But it doesn’t have to be a necessary evil. Too many employees and IT experts have experienced the pain of trying to use a needlessly complicated email encryption solution. There’s the endless steps, the hard-to-navigate portals, and the time-consuming processes that add up to a frustrating experience for most.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The State of the Virtual CISO Report: MSP/MSSP Security Strategies for 2024

The Hacker News

By the end of 2024, the number of MSPs and MSSPs offering vCISO services is expected to grow by almost 5 fold, as can be seen in figure 1. This incredible surge reflects the growing business demand for specialized cybersecurity expertise and the lucrative opportunities for MSPs and MSSPs in vCISO services.

CISO 128
article thumbnail

A malvertising campaign is delivering a new version of the macOS Atomic Stealer

Security Affairs

Researchers spotted a new malvertising campaign targeting Mac users with a new version of the macOS stealer Atomic Stealer. Malwarebytes researchers have observed a new malvertising campaign distributing an updated version of the popular Atomic Stealer (AMOS) for Mac. The Atomic Stealer first appeared in the threat landscape in April 2023. In April Cyble Research and Intelligence Labs (CRIL) discovered a Telegram channel advertising a new information-stealing malware, named Atomic macOS Stealer

Malware 128
article thumbnail

Facebook Trains Its AI on Your Data. Opting Out May Be Futile

WIRED Threat Level

Here's how to request that your personal information not be used to train Meta's AI model. "Request" is the operative word here.

127
127
article thumbnail

Building a Cyber Resilient Business: The Protection Layer

Webroot

Cybercrime is on the rise. The number of ransomware attacks has increased by 18% , while the worldwide volume of phishing attacks doubled to 500 million in 2022. Depending on the size of the business, one-third to two-thirds of businesses suffer malware attacks in any given year. And those attacks are costing companies a lot of money. In 2022, American businesses lost $10.3 billion to data breaches and cybercrime.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cybersecurity Mergers Flatline. Here’s Why That Won’t Last.

eSecurity Planet

Much like the rest of technology, merger and acquisition (M&A) activity for cybersecurity companies has been in a slump this year. There are a number of reasons why that won’t last, but still, the decline has been noteworthy. For the first seven months of this year, there were a mere 34 startups that got acquired, according to data from Crunchbase.

article thumbnail

Vulnerabilities Uncovered: Critical Remote Code Execution Risks in ASUS Routers

Heimadal Security

ASUS routers have come under the spotlight due to three critical remote code execution vulnerabilities. These vulnerabilities pose a significant threat, with all three receiving a CVSS v3.1 score of 9.8 out of 10.0. They can be exploited remotely and without authentication, potentially leading to remote code execution, service interruptions, and unauthorized operations on the […] The post Vulnerabilities Uncovered: Critical Remote Code Execution Risks in ASUS Routers appeared first on Heim

Risk 119
article thumbnail

Google is enabling Chrome real-time phishing protection for everyone

Bleeping Computer

Google announced today that it is bringing additional security to the Google Chrome standard Safe Browsing feature by enabling real-time phishing protection for all users. [.

Phishing 118
article thumbnail

US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

WIRED Threat Level

Authorities have sanctioned 11 alleged members of the cybercriminal groups, while the US Justice Department unsealed three federal indictments against nine people accused of being members.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Does Generative AI Comply With Asimov's 3 Laws of Robotics?

Dark Reading

Putting the top 10 generative AI tools to the ethical test reveals more about humanity than artificial intelligence.

article thumbnail

Iranian hackers breach US aviation org via Zoho, Fortinet bugs

Bleeping Computer

State-backed hacking groups have breached a U.S. aeronautical organization using exploits targeting critical Zoho and Fortinet vulnerabilities, a joint advisory published by CISA, the FBI, and the United States Cyber Command (USCYBERCOM) revealed on Thursday. [.

Hacking 116
article thumbnail

How New SEC Rules Can Benefit Cybersecurity Teams

Dark Reading

Securities and Exchange Commission rules elevate cybersecurity to a critical strategic concern and compel businesses to prioritize cyber resilience.

article thumbnail

Detection Engineering is Painful?—?and It Shouldn’t Be (Part 1)

Anton on Security

Detection Engineering is Painful — and It Shouldn’t Be (Part 1) This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. This post is our first installment in the “Threats into Detections — The DNA of Detection Engineering” series, where we explore opportunities and shortcomings in the brand new world of Detection Engineering.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

"Preparing for a Post-Quantum World" is the topic of a panel presentation at SecureWorld Denver on September 19, and with good reason. Quantum computing poses a potential threat to current cybersecurity practices, which are based on encryption algorithms that can be broken by quantum computers. Quantum computing uses the principles of quantum mechanics to perform calculations that are exponentially faster than what is possible with traditional computers.

article thumbnail

Minneapolis School District Reveals Full Extent of Data Breach

Heimadal Security

Minneapolis Public Schools (MPS) recently disclosed the full extent of a data breach from earlier this year, affecting more than 105,000 individuals. The breach, initially attributed to the Medusa ransomware group, compromised a wide range of personal information. The Breach and Investigation The incident, which began on February 6, 2023, and lasted until at least […] The post Minneapolis School District Reveals Full Extent of Data Breach appeared first on Heimdal Security Blog.

article thumbnail

Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key

Dark Reading

China's Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens.

109
109
article thumbnail

Exploring Class-Action Lawsuits Arising from Privacy Violations

SecureWorld News

The digital age has brought unprecedented opportunities and profound challenges in an increasingly interconnected world, particularly privacy and data protection. As institutions and corporations store vast amounts of personal information, incidents of data breaches and privacy violations have spurred a legal response that often takes the form of class-action lawsuits.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!