Researchers have observed a surge in email phishing campaigns delivering Latrodectus, a new malware loader believed to be the successor to the IcedID malware, which is capable of deploying additional payloads such as QakBot, DarkGate, and PikaBot. This article has…
Category: Cyware News – Latest Cyber News
The Importance of Access Controls in Incident Response
Adequate IAM policies are essential for incident management tooling to ensure the right people can quickly address issues without being blocked. Authentication verifies a person’s identity, while authorization manages permissions and access levels. This article has been indexed from Cyware…
Kinsing Hacker Group Expands its Cryptoming Botnet Network with More Vulnerability Exploits
The Kinsing hacker group has demonstrated its ability to continuously evolve and adapt, quickly integrating newly disclosed vulnerabilities into its exploit arsenal to expand its cryptojacking botnet across various operating systems and platforms. This article has been indexed from Cyware…
CISA Senior Official Goldstein to Leave Agency in June
Eric Goldstein, the executive assistant director for cybersecurity at the CISA, is leaving the agency in June after playing a crucial role in driving the agency’s secure-by-design initiatives and strengthening partnerships with the private sector. This article has been indexed…
White House Unveils AI Safety Framework for US Workers
The White House unveiled a framework to protect U.S. workers from AI risks, emphasizing health and safety rights, governance, human oversight, and transparency as organizations adopt new technologies. This article has been indexed from Cyware News – Latest Cyber News…
Are All Linux Vendor Kernels Insecure? A New Study Says Yes, but There’s a Fix
A study by CIQ found that Linux vendor kernels, such as those used in Red Hat Enterprise Linux (RHEL), have significant security vulnerabilities due to the backporting process used to maintain stability. This article has been indexed from Cyware News…
Intel Discloses Max Severity Bug in Its AI Model Compression Software
Intel has disclosed a critical vulnerability in its AI model compression software, Intel Neural Compressor, that allows remote attackers to execute arbitrary code on affected systems. This article has been indexed from Cyware News – Latest Cyber News Read the…
Two Students Uncover Security Bug That Could Let Millions Do Their Laundry for Free
Two students at UC Santa Cruz, Alexander Sherbrooke and Iakov Taranenko, discovered a security vulnerability in the API used by CSC ServiceWorks’ mobile app that allows anyone to remotely operate the company’s laundry machines for free. This article has been…
UK Government Publishes AI Cybersecurity Guidance
The UK government has released guidance to help AI developers and vendors protect their AI models from hacking and potential sabotage, with the goal of transforming this guidance into a global standard to promote security by design in AI systems.…
Researchers Report High-Impact Cat-Phishing Targeting Users
HP’s new report reveals that cybercriminals are increasingly using “cat-phishing” techniques, exploiting open redirects in legitimate websites to deceive users and deliver malware. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Researchers…
CISA Issues Guidance to Help Federal Agencies Better Encrypt DNS Traffic
The CISA has issued new guidance to help federal civilian agencies better encrypt their Domain Name System (DNS) traffic as part of a broader effort to improve the security posture of their internal networks and meet a zero trust deadline…
CISA Warns of Hackers Exploiting Chrome, EoL D-Link Bugs
CISA has added a high-severity vulnerability (CVE-2024-4761) in Chrome’s V8 JavaScript engine to its ‘Known Exploited Vulnerabilities’ catalog, which is being actively exploited. This article has been indexed from Cyware News – Latest Cyber News Read the original article: CISA…
Norway Recommends Replacing SSL VPN to Prevent Breaches
The Norwegian NCSC recommends organizations replace SSL VPN/WebVPN solutions with more secure alternatives, like IPsec with IKEv2, by 2025 to prevent breaches from repeated vulnerabilities. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea
Gomir shares many similarities with GoBear and features direct command and control (C2) communication, persistence mechanisms, and support for executing a wide range of commands. This article has been indexed from Cyware News – Latest Cyber News Read the original…
New Backdoors on a European Government’s Network Appear to be Russian
Researchers with the Slovak cybersecurity firm ESET published a technical analysis on Wednesday of the two backdoors by a suspected Russian threat group, which they named LunarWeb and LunarMail. This article has been indexed from Cyware News – Latest Cyber…
Is an Open-Source AI Vulnerability Next?
The challenges within the AI supply chain mirror those of the broader software supply chain, with added complexity when integrating large language models (LLMs) or machine learning (ML) models into organizational frameworks. This article has been indexed from Cyware News…
SEC to Require Financial Firms to Have Data Breach Incident Plans
The SEC now requires certain financial institutions to have written policies for detecting, addressing, and notifying customers of data breaches involving their personal information. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
OWASP Dep-Scan: Open-Source Security and Risk Audit Tool
OWASP dep-scan is an open-source security and risk assessment tool that analyzes project dependencies to identify vulnerabilities, licensing issues, and potential risks like dependency confusion attacks. This article has been indexed from Cyware News – Latest Cyber News Read the…
New UK System Will See ISPs Benefit From Same Protections as Government Networks
The UK’s NCSC has launched a new “Share and Defend” system that will provide internet service providers with the same malicious domain blocklists used to protect government networks, helping to raise cybersecurity resilience across the country. This article has been…
Cybersecurity Leaders Expect Their SOC Budgets to Grow, KPMG Finds
Cybersecurity leaders expect their security operations center (SOC) budgets to grow by up to 20% over the next two years, with the average annual SOC budget currently standing at $14.6 million, according to a survey conducted by KPMG. This article…