Authelia is an open-source authentication and authorization server that offers 2FA and SSO for applications through a web portal. It works alongside reverse proxies to permit, deny, or redirect requests. This article has been indexed from Cyware News – Latest…
Category: Cyware News – Latest Cyber News
100 Groups Urge Feds to Put UHG on Hook for Breach Notices
Over 100 medical associations and industry groups, representing thousands of U.S. doctors and healthcare professionals, have urged the HHS to hold Change Healthcare accountable for breach notifications following a massive February ransomware attack. This article has been indexed from Cyware…
Zoom Adds ‘Post-Quantum’ Encryption for Video Conferencing
To enable E2EE, all meeting participants must join from the Zoom desktop or mobile app. While those hosting a meeting on a free account can use E2EE, they will still need to verify their phone number via an SMS-delivered code.…
Veeam Warns of Critical Backup Enterprise Manager Auth Bypass Bug
?Veeam warned customers today to patch a critical security vulnerability that allows unauthenticated attackers to sign into any account via the Veeam Backup Enterprise Manager (VBEM). This article has been indexed from Cyware News – Latest Cyber News Read the…
New ‘Siren’ Mailing List Aims to Share Threat Intelligence for Open Source Projects
The Open Source Security Foundation (OpenSSF) announced a new email mailing list named Siren that aims to spread threat intelligence related to open-source projects. It will be publicly viewable and will only require registration to post on the list. This…
QNAP QTS Zero-Day in Share Feature Gets Public RCE Exploit
An extensive security audit of QNAP QTS, the operating system for the company’s NAS products, has uncovered fifteen vulnerabilities of varying severity, with eleven remaining unfixed. This article has been indexed from Cyware News – Latest Cyber News Read the…
Void Manticore Launches Destructive Attacks on Albania and Israel
Void Manticore utilizes five different methods to conduct disruptive operations against its victims. This includes several custom wipers for both Windows and Linux, alongside manual deletion of files and shared drives. This article has been indexed from Cyware News –…
Chinese Telco Gear May Get Banned in Germany
Germany is considering banning the use of Huawei and ZTE equipment in its 5G networks due to national security concerns, despite industry opposition and the potential high costs associated with the removal of the Chinese-made technology. This article has been…
Consumers Continue to Overestimate Their Ability to Spot Deepfakes
The Jumio 2024 Online Identity Study reveals that while consumers are increasingly concerned about the risks posed by deepfakes and generative AI, they continue to overestimate their ability to detect these deceptions. This article has been indexed from Cyware News…
CISA Warns of Actively Exploited NextGen Mirth Connect Pre-Auth RCE Vulnerability
The CISA has required federal agencies to update to a patched version of Mirth Connect (version 4.4.1 or later) by June 10, 2024, to secure their networks against active threats. This article has been indexed from Cyware News – Latest…
‘Linguistic Lumberjack’ Flaw in Logging Utility Fluent Bit Impacts Cloud Services
Cybersecurity researchers have discovered a critical vulnerability, dubbed “Linguistic Lumberjack,” in the popular logging and metrics utility Fluent Bit that could allow for denial-of-service (DoS), information disclosure, or remote code execution. This article has been indexed from Cyware News –…
North Korea-Linked Kimsuky APT Attack Targets Victims via Messenger
Researchers at Genians Security Center (GSC) identified the North Korea-linked Kimsuky APT group targeting victims via Facebook Messenger, using fake accounts posing as South Korean officials to deliver malware. This article has been indexed from Cyware News – Latest Cyber…
The Mystery of the Targeted Ad and the Library Patron
An attorney discovered that the mobile ads she saw were reflecting her recent library audiobook borrowing habits, raising concerns about the privacy of library patron data and the potential for targeted advertising based on that information. This article has been…
Cybercriminals Shift Tactics to Pressure More Victims Into Paying Ransoms
Cybercriminals’ new tactics led to a 64% increase in ransomware claims in 2023, driven by a 415% rise in “indirect” incidents and remote access vulnerabilities, pressuring more victims to pay ransoms, according to At-Bay. This article has been indexed from…
Fortinet FortiSIEM Command Injection Flaw (CVE-2023-34992) Deep-Dive
Researchers at Horizon3.ai discovered a critical remote code execution vulnerability (CVE-2023-34992) in Fortinet FortiSIEM, allowing unauthenticated attackers to execute commands as root users and gain access to sensitive information. This article has been indexed from Cyware News – Latest Cyber…
CyberArk Snaps up Venafi for $1.54B to Ramp up in Machine-to-Machine Security
The acquisition will allow CyberArk to expand its capabilities in securing machine-to-machine communications and address the growing attack surface in the cloud-first, AI-driven, and post-quantum world. This article has been indexed from Cyware News – Latest Cyber News Read the…
GitCaught Campaign Leverages GitHub Repositories and Fake Profiles for Malicious Infrastructure
Insikt Group uncovered a sophisticated campaign led by Russian-speaking actors who used GitHub profiles to spoof legitimate software apps and distribute various malware, including Atomic macOS Stealer (AMOS) and Vidar. This article has been indexed from Cyware News – Latest…
Chinese Duo Indicted for Laundering $73m in Pig Butchering Case
Two Chinese nationals have been indicted for their alleged involvement in a multimillion-dollar “pig butchering” investment fraud scheme, where they laundered over $73 million through US financial institutions and cryptocurrency wallets. This article has been indexed from Cyware News –…
Too Many ICS Assets are Exposed to the Public Internet
The enterprise attack surface is rapidly expanding due to the convergence of IT and OT systems, leading to a large number of ICS assets being exposed to the public internet and creating new vulnerabilities that security teams struggle to manage.…
US SEC Approves Wall Street Data Breach Reporting Regs
The SEC has approved new regulations that require broker-dealers and investment firms to notify their clients within 30 days of detecting a data breach, in an effort to modernize and enhance the protection of consumers’ financial data. This article has…