Sat.Sep 30, 2023

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang’s internal operations. Today, we’ll take a closer look at the history of Snatch, its alleged founder, and their claims that everyone has confused them with a different, older ransomware group by the same name.

article thumbnail

Cloudflare DDoS protections ironically bypassed using Cloudflare

Bleeping Computer

Cloudflare's Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security controls. [.

DDOS 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ALPHV/BlackCat ransomware gang hacked the hotel chain Motel One

Security Affairs

The ALPHV/BlackCat ransomware gang added the hotel chain Motel One to the list of victims on its Tor leak site. Motel One is a German hotel chain that offers budget-friendly accommodations primarily targeted at business and leisure travelers. It is known for its stylish and design-focused hotels that aim to provide a comfortable and affordable stay for guests.

Hacking 121
article thumbnail

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting the same victims, at least since July 2023. "During these attacks, cyber threat actors deployed two different ransomware variants against victim companies from the following variants: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal," the FBI said in an alert.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Progress Software fixed two critical severity flaws in WS_FTP Server

Security Affairs

Progress Software has addressed a critical severity vulnerability in its WS_FTP Server software used by thousands of IT teams worldwide. Progress Software warned customers to address a critical severity vulnerability, tracked as CVE-2023-40044 (CVSS score 10), in its WS_FTP Server software which is used by thousands of IT teams worldwide. “The WS_FTP team recently discovered vulnerabilities in the WS_FTP Server Ad hoc Transfer Module and in the WS_FTP Server manager interface.

Software 111
article thumbnail

Microsoft fixes Outlook prompts to reopen closed windows

Bleeping Computer

Microsoft has resolved a known issue that caused Outlook Desktop to unexpectedly prompt users to reopen previously closed windows. [.

120
120

More Trending

article thumbnail

Chinese Hackers Are Hiding in Routers in the US and Japan

WIRED Threat Level

Plus: Stolen US State Department emails, $20 million zero-day flaws, and controversy over the EU’s message-scanning law.

Hacking 114
article thumbnail

A Closer Look at the Snatch Data Ransom Group

Security Boulevard

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang's internal operations. Today, we'll take a closer look at the history of Snatch, its alleged founder, and their claims that everyone has confused them with a different, older ransomware group by the same name.

article thumbnail

Apple, Microsoft, and Google Just Fixed Multiple Zero-Day Flaws

WIRED Threat Level

Plus: Mozilla patches 10 Firefox bugs, Cisco fixes a vulnerability with a rare maximum severity score, and SAP releases updates to stamp out three highly critical flaws.

Hacking 83
article thumbnail

2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs

Security Boulevard

Welcome to the 11th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API10:2023 Unsafe Consumption of APIs. In this series we are taking an in-depth look at each category – the details, the impact and what you [.] The post 2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs appeared first on Wallarm.

62
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

FBI warns of dual ransomware attacks

Security Affairs

The U.S. Federal Bureau of Investigation (FBI) warns of dual ransomware attacks aimed at the same victims. The U.S. Federal Bureau of Investigation (FBI) is warning of dual ransomware attacks, a new worrisome trend in the threat landscape that sees threat actors targeting the same victims two times. “As of July 2023, the FBI noted two trends emerging across the ransomware environment and is releasing this notification for industry awareness.

article thumbnail

Avoid libwebp Electron Woes On macOS With positron

Security Boulevard

If you’ve got ? on this blog (directly, or via syndication) you’d have to have been living under a rock to not know about the libwebp supply chain disaster. An unfortunate casualty of inept programming just happened to be any app in the Electron ecosystem that doesn’t undergo bleeding-edge updates. Former cow-orker Tom Sellers (one. Continue reading → The post Avoid libwebp Electron Woes On macOS With positron appeared first on Security Boulevard.

article thumbnail

Child abuse site taken down, organized child exploitation crime suspected – exclusive

Security Affairs

A child abuse site has been taken down following a request to German law enforcement by Cybernews research team. A hacker collective, who wanted to remain anonymous, has been relentlessly hunting online crooks who benefit from videos of children being abused. This week, they discovered a website dedicated to pedophiles – it was full of explicit video material featuring minors.

Marketing 112
article thumbnail

DEF CON 31 – Lorenzo Cococcia ‘s ‘War Stories – Finding Foes And Yourself With Latency Trilateration’

Security Boulevard

Many thanks to DEF CON 31 for publishing their presenter’s tremendous DefCon Conference 31 Presenters Content at Caesars Forum, Fllamingo, Harrah’s and Linq in Las Vegas, Nevada via the organizations YouTube channel. Permalink The post DEF CON 31 – Lorenzo Cococcia ‘s ‘War Stories – Finding Foes And Yourself With Latency Trilateration’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Discover Endpoint VPN in 2023: Unlocking Secure Remote Access

Security Boulevard

Introduction Introduction In today’s interconnected world, the need for secure remote access to networks and data has never been more crucial. As we navigate the complexities of remote work, especially in the ever-evolving landscape of 2023, understanding the role of Endpoint VPNs becomes indispensable. As depicted in the infographic, Endpoint VPNs serve as the shield … Discover Endpoint VPN in 2023: Unlocking Secure Remote Access Read More » The post Discover Endpoint VPN in 2023: Unlocking Sec

VPN 70