Thu.Nov 28, 2024

article thumbnail

APT trends report Q3 2024

SecureList

Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly summaries of advanced persistent threat (APT) activity for over seven years now. Based on our threat intelligence research, these summaries offer a representative overview of what we’ve published and discussed in more detail in our private APT reports. They are intended to highlight the significant events and findings that we think are important for people to know about.

Malware 117
article thumbnail

T-Mobile detected network intrusion attempts and blocked them

Security Affairs

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. The carrier is investigating reports that are linking it to “ Salt Typhoon ” cyberattacks tied to Chinese state actors. “Like the entire telecommunications industry, T-Mobile has been closely

Mobile 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC

Penetration Testing

Security researchers from TrustedSec have uncovered a critical zero-day vulnerability, CVE-2024-49019, affecting Active Directory Certificate Services (AD CS). This flaw exploits a feature of version 1 certificate templates, allowing attackers... The post Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC appeared first on Cybersecurity News.

article thumbnail

A cyberattack impacted operations at UK Wirral University Teaching Hospital

Security Affairs

UK’s Wirral University Teaching Hospital suffered a cyberattack that caused delays in appointments and procedures. Wirral University Teaching Hospital NHS Foundation Trust (WUTH) is an NHS Foundation Trust. It provides healthcare for people of the Wirral Peninsula and the surrounding areas of North West England and North Wales. The trust is responsible for Arrowe Park Hospital, Clatterbridge Hospital, and Wirral Women and Children’s Hospital.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

CVE-2024-42330 (CVSS 9.1): Zabbix Patches Critical Remote Code Execution Vulnerability

Penetration Testing

Popular open-source monitoring tool Zabbix has released urgent security updates to address a critical vulnerability that could allow attackers to execute arbitrary code on vulnerable systems. The vulnerability, tracked as... The post CVE-2024-42330 (CVSS 9.1): Zabbix Patches Critical Remote Code Execution Vulnerability appeared first on Cybersecurity News.

article thumbnail

Bootkitty: Analyzing the first UEFI bootkit for Linux

We Live Security

ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.

145
145

LifeWorks

More Trending

article thumbnail

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

The Hacker News

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. "Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware," Check Point said in a new analysis published Wednesday.

article thumbnail

Integer Overflow Vulnerability in Windows Driver Enables Privilege Escalation, PoC Published

Penetration Testing

An independent researcher has uncovered a critical vulnerability in the ksthunk.sys driver, a component of the Windows operating system responsible for facilitating 32-bit to 64-bit process communications. The flaw, which... The post Integer Overflow Vulnerability in Windows Driver Enables Privilege Escalation, PoC Published appeared first on Cybersecurity News.

article thumbnail

U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency

The Hacker News

A 59-year-old U.S. citizen who immigrated from the People's Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the country and sharing sensitive information about his employer with China's principal civilian intelligence agency.

126
126
article thumbnail

Contiki-NG IoT OS Patches Critical Vulnerabilities

Penetration Testing

Researchers have identified and addressed three critical vulnerabilities in Contiki-NG, a popular open-source operating system for Internet of Things (IoT) devices. These vulnerabilities could allow attackers to crash devices or... The post Contiki-NG IoT OS Patches Critical Vulnerabilities appeared first on Cybersecurity News.

IoT 67
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP

The Hacker News

Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges.

Wireless 125
article thumbnail

Scams to look out for this holiday season

We Live Security

‘Tis the season to be wary – be on your guard for fraud doing the rounds during the holiday sales surge

Scams 120
article thumbnail

XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

The Hacker News

Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems.

article thumbnail

Get a refurbished Amazon Fire HD 10 tablet for as little as $40 with this Black Friday deal

Zero Day

Save big this holiday season on an Amazon Fire HD 10 tablet that's perfect for a kid or casual use.

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Future of Serverless Security in 2025: From Logs to Runtime Protection

The Hacker News

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration.

110
110
article thumbnail

Want an entire tech repair shop of tools in a single messenger bag? Get 20% off for Black Friday

Zero Day

The iFixit Repair Business Toolkit got a refresh in 2023. I've been using the kit for over a year. Here's what I have inside the bag now.

105
105
article thumbnail

Zello urges users to reset passwords following a cyber attack

Security Affairs

Zello urges customers with accounts created before November 2 to reset passwords following a potential security breach. Zello is warning customers who have an account created before November 2 to reset their passwords, a circumstance that suggests that the incident took place on November 2. Zello is a tech software company in Austin, Texas, U.S., known for the Zello app, which emulates push-to-talk (PTT) walkie-talkies over cell phone networks.

article thumbnail

The 25 best Black Friday Best Buy deals 2024: Early sales are live

Zero Day

With Black Friday one away, we've rounded up some top discounts already available at Best Buy.

98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

TikTok Takes Aim at Appearance-Altering Filters and Underage Users in Latest Safety Push

Penetration Testing

In a move driven by both legal pressures and growing concerns about the impact of social media on young people, TikTok has announced new measures to restrict the use of... The post TikTok Takes Aim at Appearance-Altering Filters and Underage Users in Latest Safety Push appeared first on Cybersecurity News.

Media 87
article thumbnail

Score a free Google Pixel 9 phone with this T-Mobile Black Friday deal

Zero Day

T-Mobile gives you a free Pixel 9 phone with qualifying trade-in or new line activation, with up to $800 back across 24 months of credits.

Mobile 98
article thumbnail

Godot Engine Compromised: Malware Distributed via GodLoader

Penetration Testing

Check Point Research has identified the misuse of the Godot game engine—a popular, open-source tool for game development—as a platform for distributing malware. Dubbed GodLoader, this novel technique highlights how... The post Godot Engine Compromised: Malware Distributed via GodLoader appeared first on Cybersecurity News.

article thumbnail

Instead of AirPods, I'd recommend Meta Ray-Bans as the best tech deal of Black Friday 2024

Zero Day

A special Black Friday Meta Ray-Bans deal delivers a rare discount up to 50% off. The smart glasses have audio nearly as good as a pair of AirPods, plus you get a fast camera and a hands-free AI assistant.

94
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Evasive Malware Campaign Leverages CleverSoar Installer & Nidhogg Rootkit

Penetration Testing

Rapid7 Labs has uncovered a sophisticated malware campaign employing the newly identified CleverSoar installer, a highly evasive threat targeting Chinese and Vietnamese-speaking users. With advanced evasion techniques and layered malicious... The post Evasive Malware Campaign Leverages CleverSoar Installer & Nidhogg Rootkit appeared first on Cybersecurity News.

Malware 80
article thumbnail

The Apple Watch Ultra 2 just dropped to its lowest price yet for Black Friday

Zero Day

Nearly every Apple Watch is on sale for Black Friday, and the Ultra 2 hasn't been left out. Snag one for a whopping $179 off at Amazon.

88
article thumbnail

Credit Card Skimmer Malware Uncovered: Targeting Magento Checkout Pages

Penetration Testing

Magento, a leading eCommerce platform, has once again become the target of sophisticated cybercriminal tactics. Security Analyst Puja Srivastava, from Sucuri, recently reported on a malicious JavaScript injection that compromises... The post Credit Card Skimmer Malware Uncovered: Targeting Magento Checkout Pages appeared first on Cybersecurity News.

article thumbnail

I've tested dozens of power banks. This one is in a class of its own and you can get it for $85

Zero Day

The Cuktech P-series power bank may look like something from a sci-fi movie, but its efficiency and premium build are very real. For Black Friday, Amazon has reduced the device to $85.

Banking 85
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Beyond FUD Links: Rockstar PaaS Kit Exploits Trusted Platforms for Phishing

Penetration Testing

The Rockstar Phishing-as-a-Service (PaaS) kit has caught the attention of cybersecurity experts for its advanced and devious tactics to bypass email defenses. In a report from Trustwave SpiderLabs, Rockstar’s arsenal... The post Beyond FUD Links: Rockstar PaaS Kit Exploits Trusted Platforms for Phishing appeared first on Cybersecurity News.

article thumbnail

The 75+ best Black Friday Amazon deals 2024: Apple, Roborock, Kindle and more

Zero Day

It might be Thanksgiving, but Black Friday deals are already in full swing. We rounded up the best deals you can shop on Amazon right now.

85
article thumbnail

When Your Coffee Break Faces a Cyber Threat

Centraleyes

What happens when the backbone of global operations—supply chain software—comes under attack? Starbucks and leading UK supermarkets like Morrisons and Sainsbury’s are now living that reality. A recent ransomware breach on Blue Yonder disrupted everything from payroll systems to fresh produce logistics, sending a clear message: supply chain security is more critical than ever.

article thumbnail

How I bought the Meta Ray-Bans for 20% off on Black Friday - and got an Amazon gift card too

Zero Day

Consistent feature updates, a rare discount, and a free $90 Amazon gift card make the Meta Ray-Ban smart glasses a no-brainer purchase for me this holiday season.

81
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!