On 17 September 2024, Sekoia’s Threat Detection & Research (TDR) team identified a notable infection chain targeting both Windows and Linux systems through our Oracle WebLogic honeypot. The attacker exploited CVE-2017-10271 and CVE-2020-14883 Weblogic vulnerabilities to deploy Python and Bash…
Category: EN
Some Americans are finally able to renew their passports online
One of the scariest things that could happen to a traveler with an upcoming international trip is to find out that the passport is about… The post Some Americans are finally able to renew their passports online appeared first on…
UK and US Warn of Growing Iranian Spear Phishing Threat
Security agencies from the UK and US are urging individuals with Middle East links to beware of Iranian spear phishing attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: UK and US Warn of Growing Iranian Spear…
Facebook Parent Fined £75m Over Password Storage
Facebook parent Meta fined 91m euros over unencrypted storage of hundreds of millions of passwords dating back to 2012 This article has been indexed from Silicon UK Read the original article: Facebook Parent Fined £75m Over Password Storage
A week in security (September 23 – September 29)
A list of topics we covered in the week of September 23 to September 29 of 2024 This article has been indexed from Malwarebytes Read the original article: A week in security (September 23 – September 29)
The Rise of API Security Automation: Defending the Digital Frontlines with AI and Machine Learning
APIs (Application Programming Interfaces) are the backbone of modern digital services, driving the seamless flow of data and functionality between applications. From enabling quick social media logins to processing payments and connecting complex systems, APIs have revolutionized how businesses operate…
Meta Fined €91 Million for Storing Millions of Facebook and Instagram Passwords in Plaintext
The Irish Data Protection Commission (DPC) has fined Meta €91 million ($101.56 million) as part of a probe into a security lapse in March 2019, when the company disclosed that it had mistakenly stored users’ passwords in plaintext in its…
NIST issues new password guidelines: Cyber Security Today for Monday, September 30, 2024
New NIST Password Guidelines, Octo2 Trojan & ChatGPT Vulnerabilities | Cybersecurity Today Join Jim Love in today’s episode of Cybersecurity Today as he discusses the latest password security guidelines from NIST focusing on length and usability, the emergence of the…
Israeli Army Hacked Beirut Airport to Threaten Civilians
The Israeli army reportedly hacked into the control tower of Beirut’s Rafic Hariri International Airport. The incident involved issuing threats against an Iranian civilian aircraft attempting to land, according to official sources cited by Anadolu Agency. Lebanese Response to Israeli…
CISA Urges Action as Attackers Exploit Critical Systems Using Basic Tactics
The Cybersecurity and Infrastructure Security Agency (CISA) has once again raised alarms about the ongoing exploitation of operational technology (OT) and industrial control systems (ICS) across critical infrastructure sectors. The warning comes amid an active investigation into a cybersecurity incident…
Kia Vulnerability Enables Remote Access to Millions of Cars Using Just a License Plate
Cybersecurity researchers identified critical vulnerabilities in Kia vehicles, revealing that attackers could remotely control cars using only a license plate number. The vulnerabilities were first identified in June this year and have since been patched, but the potential impact has…
Escape vs Salt Security
Discover why Escape is a better API security solution. The post Escape vs Salt Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Escape vs Salt Security
Eliminating Memory Safety Vulnerabilities at the Source
Posted by Jeff Vander Stoep – Android team, and Alex Rebert – Security Foundations Memory safety vulnerabilities remain a pervasive threat to software security. At Google, we believe the path to eliminating this class of vulnerabilities at scale and building…
SCCMSecrets: Open-source SCCM policies exploitation tool
SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as they can expose sensitive technical information, including account credentials. Attackers may…
Could APIs be the undoing of AI?
Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data). But the combination of API and LLM issues coupled with rapid rollouts is likely to see numerous organizations having to…
AI code helpers just can’t stop inventing package names
LLMs are helpful, but don’t use them for anything important AI models just can’t seem to stop making things up. As two recent studies point out, that proclivity underscores prior warnings not to rely on AI advice for anything that…
Open source maintainers: Key to software health and security
Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and open-source code accounting for 70% or more of the typical application. In this Help Net Security video, Donald Fischer, CEO…
What Are the Main Types of Cybersecurity Risks That Should Be Accepted?
In today’s digital landscape, cybersecurity is a pressing concern for organizations of all sizes. As businesses increasingly rely on technology, accepting certain types of risks… The post What Are the Main Types of Cybersecurity Risks That Should Be Accepted? appeared…
Forget the Kia Boyz: Hackers could hijack your car with just a smartphone
PLUS: UK man charged with hacking US firms for stock secrets; ransomware actor foils self; and more Infosec In Brief Put away that screwdriver and USB charging cable – the latest way to steal a Kia just requires a cellphone…
Industry Moves for the week of September 30, 2024 – SecurityWeek
Explore industry moves and significant changes in the industry for the week of September 30, 2024. Stay updated with the latest industry trends and shifts. This article has been indexed from SecurityWeek RSS Feed Read the original article: Industry Moves…