Mon.Aug 12, 2024

article thumbnail

Taxonomy of Generative AI Misuse

Schneier on Security

Interesting paper: “ Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data “: Generative, multimodal artificial intelligence (GenAI) offers transformative potential across industries, but its misuse poses significant risks. Prior research has shed light on the potential of advanced AI systems to be exploited for malicious purposes.

article thumbnail

Secureworks Fills Australian Mid-Market Demand for Simplified Cyber Security Solutions

Tech Republic Security

The CEO of a burgeoning cybersecurity firm spoke to TechRepublic about XDR, ransomware, the Crowdstrike outage and what organisations can do to prepare for cyberattacks.

Marketing 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

The Hacker News

The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges. The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.

136
136
article thumbnail

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Tech Republic Security

KnowBe4 Security Awareness Advocate Erich Kron talked to TechRepublic about the importance of assessing a seemingly urgent email before clicking any links.

Scams 161
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Security Affairs

Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

article thumbnail

Security Flaw in PostgreSQL: CVE-2024-7348 Allows Arbitrary SQL Execution

Penetration Testing

The PostgreSQL project has issued a security advisory, warning users of a serious vulnerability (CVE-2024-7348). The flaw, which carries a CVSS score of 8.8, exposes users to the risk of... The post Security Flaw in PostgreSQL: CVE-2024-7348 Allows Arbitrary SQL Execution appeared first on Cybersecurity News.

Risk 128

More Trending

article thumbnail

Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels

Security Boulevard

A global survey of 300 IT and security professionals suggests that while security budgets are increasing the way funding is being allocated is shifting as organizations look to automate workflows. The post Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels appeared first on Security Boulevard.

article thumbnail

EastWind campaign targets Russian organizations with sophisticated backdoors

Security Affairs

A campaign tracked as EastWind is targeting Russian government and IT organizations with PlugY and GrewApacha Backdoors. In late July 2024, Kaspersky researchers detected a series of targeted cyberattacks against the Russian government and IT organizations. Kaspersky named this campaign has EastWind. Threat actors sent phishing emails with RAR archive attachments containing a Windows shortcut to install malware.

Malware 113
article thumbnail

AI Integration, Budget Pressures Challenge CISOs

Security Boulevard

Chief information security officers (CISOs) are struggling to manage cybersecurity effectively due to a lack of strategic support from other C-suite executives, according to a LevelBlue survey of 1,050 C-suite and senior executives. The post AI Integration, Budget Pressures Challenge CISOs appeared first on Security Boulevard.

CISO 113
article thumbnail

Ukraine Warns of New Phishing Campaign Targeting Government Computers

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security Service of Ukraine to distribute malware capable of remote desktop access. The agency is tracking the activity under the name UAC-0198.

article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

DOJ Shuts Down Another North Korean ‘Laptop Farm’

Security Boulevard

The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program and to steal information from unsuspecting companies in the United States and elsewhere. The post DOJ Shuts Down Another North Korean ‘Laptop Farm’ appeared first on Security Boulevard.

Scams 109
article thumbnail

Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

The Hacker News

Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and Deye that could enable malicious actors to cause disruption and power blackouts.

article thumbnail

CVE-2024-22116 (CVSS 9.9): Critical RCE Vulnerability Found in Zabbix Monitoring Solution

Penetration Testing

Zabbix, a widely-adopted open-source solution for enterprise-level IT infrastructure monitoring, has disclosed a critical security vulnerability that could lead to full system compromise. The vulnerability, identified as CVE-2024-22116 and assigned... The post CVE-2024-22116 (CVSS 9.9): Critical RCE Vulnerability Found in Zabbix Monitoring Solution appeared first on Cybersecurity News.

article thumbnail

How Phishing Attacks Adapt Quickly to Capitalize on Current Events

The Hacker News

In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year, according to research from Egress. What's behind the surge in phishing?

Phishing 115
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Norton Secure VPN vs NordVPN (2024): Which VPN Is the Best?

Tech Republic Security

Compare Norton Secure VPN and NordVPN based on speed, server options, privacy and support to learn which is better.

VPN 136
article thumbnail

The Value in Root Cause Analysis for Vulnerability Management

Security Boulevard

Identifying and addressing underlying issues and their root causes can lead to risk reduction, cost savings and better overall performance of a vulnerability management program. The post The Value in Root Cause Analysis for Vulnerability Management appeared first on Security Boulevard.

Risk 103
article thumbnail

The AI Hangover is Here – The End of the Beginning

The Hacker News

After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the market corrects the share price of the major players (like Nvidia, Microsoft, and Google), while other players reassess the market and adjust priorities. Gartner calls it the trough of disillusionment, when interest wanes and implementations fail to deliver the promised breakthroughs.

Marketing 105
article thumbnail

Akamai Unveils New VPN Post-Exploitation Techniques: Major Vulnerabilities Discovered in Ivanti and FortiGate VPNs

Penetration Testing

Akamai researchers have exposed a series of vulnerabilities and techniques that could allow threat actors to further escalate their attacks after compromising a Virtual Private Network (VPN) server. The analysis... The post Akamai Unveils New VPN Post-Exploitation Techniques: Major Vulnerabilities Discovered in Ivanti and FortiGate VPNs appeared first on Cybersecurity News.

VPN 94
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Indirect prompt injection in the real world: how people manipulate neural networks

SecureList

What is prompt injection? Large language models (LLMs) – the neural network algorithms that underpin ChatGPT and other popular chatbots – are becoming ever more powerful and inexpensive. For this reason, third-party applications that make use of them are also mushrooming, from systems for document search and analysis to assistants for academic writing, recruitment and even threat research.

article thumbnail

New Phishing Campaign Deploys PureHVNC and Other Malware, Targets Sensitive Data

Penetration Testing

Cybersecurity researchers from FortiGuard Labs have discovered a sophisticated phishing campaign that utilizes a multi-stage execution flow and various evasion techniques to deliver multiple strains of malware, including the remote... The post New Phishing Campaign Deploys PureHVNC and Other Malware, Targets Sensitive Data appeared first on Cybersecurity News.

Phishing 101
article thumbnail

The BlackSuit ransomware gang has demanded over $500 million since 2022

Graham Cluley

A notorious ransomware group has demanded more than half a billion dollars from victims in less than two years. Read more in my article on the Hot for Security blog.

article thumbnail

BYOVDLL: New Exploit Bypasses Microsoft’s LSASS Defenses

Penetration Testing

In July 2022, Microsoft made modifications to its Protected Process Light (PPL) system aimed at mitigating a vulnerability that allowed bypassing the protection of LSASS, a critical process responsible for... The post BYOVDLL: New Exploit Bypasses Microsoft’s LSASS Defenses appeared first on Cybersecurity News.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The great location leak: Privacy risks in dating apps

We Live Security

Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance.

Risk 100
article thumbnail

AI girlfriends want to know all about you. So might ChatGPT (Lock and Code S05E17)

Malwarebytes

This week on the Lock and Code podcast… Somewhere out there is a romantic AI chatbot that wants to know everything about you. But in a revealing overlap, other AI tools—which are developed and popularized by far larger companies in technology—could crave the very same thing. For AI tools of any type, our data is key. In the nearly two years since OpenAI unveiled ChatGPT to the public, the biggest names in technology have raced to compete.

article thumbnail

Spotlight on Cybersecurity Leaders: Hemanth Tadepalli

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Hemanth Tadepalli is a a cybersecurity expert with experience across various sectors of security.

article thumbnail

Top 6 Craigslist scams: Don’t fall for these tricks

We Live Security

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun

Scams 84
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How Cybersecurity Can Save Critical Infrastructure

Thales Cloud Protection & Licensing

How Cybersecurity Can Save Critical Infrastructure josh.pearson@t… Tue, 08/13/2024 - 07:05 Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS). Motivated by various factors – from monetary to geopolitical – malevolent actors seek to disrupt critical operations.

article thumbnail

USENIX Security ’23 – DISTDET: A Cost-Effective Distributed Cyber Threat Detection System

Security Boulevard

Authors/Presenters:Feng Dong, Liu Wang Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

article thumbnail

A week in security (August 5 – August 11)

Malwarebytes

Last week on Malwarebytes Labs: Security company ADT announces security breach of customer data Stolen data from scraping service National Public Data leaked online Android vulnerability used in targeted attacks patched by Google Men report more pressure and threats to share location and accounts with partners, research shows Magniber ransomware targets home users Last week on ThreatDown: Ransomware group disguises SharpRhino trojan as Angry IP Scanner Don’t touch TP!

article thumbnail

How Outdated Security Measures Can Devastate Your Organization

Security Boulevard

In today’s digital world, data exfiltration is a stealthy threat that often flies under the radar. The post How Outdated Security Measures Can Devastate Your Organization appeared first on Seceon. The post How Outdated Security Measures Can Devastate Your Organization appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.