Fri.Feb 16, 2024

article thumbnail

Friday Squid Blogging: Vegan Squid-Ink Pasta

Schneier on Security

It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

215
215
article thumbnail

OpenAI’s Sora Generates Photorealistic Videos

Tech Republic Security

Sora is in red teamers' and selected artists' hands for now, as OpenAI tries to prevent AI video from being used for misinformation or offensive content.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RETVec: Resilient and Efficient Text Vectorizer

Elie

This research study presented at NeurIPS 2024 introduces RETVec, a robust and multilingual text vectorizer that provides efficiency and resilience against typos and adversarial attacks for neural-based text processing.

137
137
article thumbnail

What Is a Passphrase? Examples, Types & Best Practices

Tech Republic Security

Learn about passphrases and understand how you can use these strong yet memorable phrases to safeguard your accounts against hackers.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

WIRED Threat Level

A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data.

article thumbnail

U.S. CISA: hackers breached a state government organization

Security Affairs

U.S. CISA revealed that threat actors breached an unnamed state government organization via an administrator account belonging to a former employee. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that a threat actor gained access to an unnamed state government organization’s network environment via an administrator account belonging to a former employee.

More Trending

article thumbnail

Microsoft Exchange vulnerability actively exploited

Malwarebytes

As it turns out, there was another actively exploited vulnerability included in Microsoft’s patch Tuesday updates for February. When Microsoft said in its update guide for CVE-2024-21410 that the vulnerability was likely to be exploited by attackers, they weren’t kidding. Soon after they changed the status to “Exploitation Detected”. Today, I was alerted to the fact after spotting a warning by the German Federal Office for Information Security (BSI) about the same vulnerability, Something the BS

article thumbnail

DoD Email Breach: Pentagon Tells Victims 12 Months Late

Security Boulevard

3TB Email FAIL: Personal info of tens of thousands leaks. Microsoft cloud email server was missing a password. The post DoD Email Breach: Pentagon Tells Victims 12 Months Late appeared first on Security Boulevard.

Passwords 127
article thumbnail

ALPHV ransomware claims loanDepot, Prudential Financial breaches

Bleeping Computer

The ALPHV/Blackcat ransomware gang has claimed responsibility for the recent network breaches of Fortune 500 company Prudential Financial and mortgage lender loanDepot. [.

article thumbnail

PoC Published for Critical Mastodon Vulnerability – CVE-2024-23832 (CVSS 9.8)

Penetration Testing

Mastodon, the decentralized social media platform that’s rapidly gained popularity, faces a critical security threat. A recently patched vulnerability (CVE-2024-23832) has been exposed, with proof-of-concept (PoC) exploit code now freely circulating in the wild.... The post PoC Published for Critical Mastodon Vulnerability – CVE-2024-23832 (CVSS 9.8) appeared first on Penetration Testing.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Systems Integrators Can Integrate MDR Successfully

Security Boulevard

Integrating MDR into client offerings allows systems integrators to provide greater value while staying focused on their core strengths. The post How Systems Integrators Can Integrate MDR Successfully appeared first on Security Boulevard.

article thumbnail

GoldPickaxe Trojan steals your face!

Malwarebytes

Well, the GoldPickaxe Trojan does not literally steal your face, but it does steal an image of your face in order to be able to identify as you. Researchers have found a family of Trojans, attributed to a financially motivated Chinese group, which come in versions for iOS and Android. Cybercriminals try to trick victims into scanning their faces along with identification documents.

article thumbnail

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities (KEV) catalog, following reports that it's being likely exploited in Akira ransomware attacks.

article thumbnail

North Korean hackers now launder stolen crypto via YoMix tumbler

Bleeping Computer

The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched to using YoMix bitcoin mixer to launder stolen proceeds. [.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders

Security Affairs

The U.S. government offers rewards of up to $10 million for information that could lead to the identification or location of ALPHV/Blackcat ransomware gang leaders. The U.S. Department of State is offering a reward of up to $10 million for information leading to the identification or location of the key figures behind the ALPHV/Blackcat ransomware operation.

article thumbnail

Wyze investigating 'security issue' amid ongoing outage

Bleeping Computer

Wyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this morning. [.

119
119
article thumbnail

CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2020-3259 Cisco ASA and FTD Information Disclosure Vulnerability CVE-2024-21410 Microsoft Exchange Server Privilege Escalation Vulnerability The vulnerability CVE-2020-3259

article thumbnail

LogMeOnce vs Bitwarden (2024): Which Password Manager is Better?

Tech Republic Security

While LogMeOnce features a useful password scoring system, Bitwarden’s more polished user interface and open source software make it a better pick for most businesses.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

Russia-linked APT group Turla has been spotted targeting Polish non-governmental organizations (NGO) with a new backdoor dubbed TinyTurla-NG. Russia-linked cyberespionage group Turla has been spotted using a new backdoor dubbed TinyTurla-NG in attacks aimed at Polish non-governmental organizations. The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2004 targeting diplomatic and government organizations and private businesse

article thumbnail

Malicious 'SNS Sender' Script Abuses AWS for Bulk Smishing Attacks

The Hacker News

A malicious Python script known as SNS Sender is being advertised as a way for threat actors to send bulk smishing messages by abusing Amazon Web Services (AWS) Simple Notification Service (SNS).

article thumbnail

Alpha ransomware linked to NetWalker operation dismantled in 2021

Bleeping Computer

Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. [.

article thumbnail

Google Open Sources Magika: AI-Powered File Identification Tool

The Hacker News

Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

CVE-2024-23476 & 23479: Pre-Authentication RCE Flaws Found in SolarWinds ARM

Penetration Testing

Security researchers have uncovered a dangerous cluster of vulnerabilities affecting the popular SolarWinds Access Rights Manager (ARM) software. Of the five disclosed flaws, three carry the potential for unauthenticated remote code execution – meaning... The post CVE-2024-23476 & 23479: Pre-Authentication RCE Flaws Found in SolarWinds ARM appeared first on Penetration Testing.

article thumbnail

RustDoor macOS Backdoor Targets Cryptocurrency Firms with Fake Job Offers

The Hacker News

Several companies operating in the cryptocurrency sector are the target of a newly discovered Apple macOS backdoor codenamed RustDoor. RustDoor was first documented by Bitdefender last week, describing it as a Rust-based malware capable of harvesting and uploading files, as well as gathering information about the infected machines.

article thumbnail

PoC Exploit Released for Microsoft Outlook RCE Flaw – CVE-2024-21413

Penetration Testing

The pressure to update to the latest versions of Microsoft Outlook has hit boiling point with the release of proof-of-concept (PoC) exploit code against a critical vulnerability (CVE-2024-21413), patched this week, and now in... The post PoC Exploit Released for Microsoft Outlook RCE Flaw – CVE-2024-21413 appeared first on Penetration Testing.

article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

Volt Typhoon, a notorious cyber group linked to the People’s Republic of China, has expanded its operations beyond illegal access and data theft. This state-backed hacker collective, also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus, has infiltrated the networks of critical infrastructure sectors ranging from aviation to maritime in a strategic bid for future catastrophic cyberattacks.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

eHIDS: Linux Host-based Intrusion Detection System based on eBPF

Penetration Testing

eHIDS A Linux Host-based Intrusion Detection System based on eBPF. Implementations & Functionalities: TCP network data capture UDP network data capture DNS information capture in uprobe mode Process data capture Uprobe way to achieve... The post eHIDS: Linux Host-based Intrusion Detection System based on eBPF appeared first on Penetration Testing.

article thumbnail

What is Phone Cloning?

Identity IQ

What is Phone Cloning? IdentityIQ As technology advances, the tricks scammers use to get your personal data and money have also become more complex and corrupt. Hacking into computers has been a thing for decades, but what do you know about the process of cloning mobile phones? What is Phone Cloning? Phone cloning is when an exact replica of a mobile phone is created.

article thumbnail

How to Defend Against the 10 Most Dangerous Privileged Attack Vectors

Heimadal Security

Since the earliest days of technology, hackers and cybersecurity professionals have been locked in a cat-and-mouse game, each inventing more innovative ways of outsmarting the other. In 2024, that resulted in an increasingly complex landscape of privileged threat vectors for organizations to defend against. This creates a key challenge for security teams.

article thumbnail

Okta vs. Microsoft Entra ID (Azure Active Directory) 2024: IAM Software Comparison

Tech Republic Security

In this guide, we compare BeyondTrust and CyberArk—two Identity and Access Management (IAM) solutions.

Software 109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.