article thumbnail

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play

The Last Watchdog

Crowdsourced security vendors (others include Synack, Hacker One and Intigriti) make it seamless for companies to tap into a global network of software coders, and set them on the hunt for vulnerabilities. “What we’ve got under the hood is effectively a dating website for people who are good at breaking into computers,” Ellis says.

article thumbnail

Hackers Exploit Google Ads to Spread Malware Disguised as Popular Software

Penetration Testing

A new report released by AhnLab Security Intelligence Center (ASEC) uncovers a disturbing tactic hackers are using to spread malware: they’re leveraging Google Ads tracking features to redirect unsuspecting users to malicious websites.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Weaponize Popular Software Framework for Stealthy Data Theft

Penetration Testing

In a disturbing new development, cybersecurity experts at AhnLab Security Intelligence Center (ASEC) have revealed a growing trend of infostealer malware abusing the Electron framework.

article thumbnail

Enhance security with Sonatype Lifecycle and ServiceNow Application Vulnerability Response (AVR) integration

Security Boulevard

We are excited to announce an innovative partnership that integrates Sonatype's open source software (OSS) security intelligence directly into ServiceNow workstreams. The post Enhance security with Sonatype Lifecycle and ServiceNow Application Vulnerability Response (AVR) integration appeared first on Security Boulevard.

article thumbnail

Attackers Exploit Construction Site Trust, Deliver TrollAgent Malware

Penetration Testing

Security experts at the AhnLab Security Intelligence Center (ASEC) have recently uncovered a malware distribution campaign targeting a Korean construction-related association website.

Malware 83
article thumbnail

ServiceNow to detect open source security vulnerabilities with Snyk integration

CSO Magazine

This will represent the Israeli-US vendor’s advanced software composition analysis (SCA) backed by Snyk’s security intelligence—a combination of public sources, data from the developer community, proprietary expert research, machine learning, and human-in-the-loop AI.

article thumbnail

Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns

Security Affairs

Microsoft experts spotted the Zerologon attacks involving fake software updates, the researchers noticed that the malicious code connected to command and control (C&C) infrastructure known to be associated with TA505. A new campaign shrewdly poses as software updates that connect to known CHIMBORAZO (TA505) C2 infrastructure.