Category: EN

Zyxel unveils new cloud-managed switches for small businesses and professional home users

Zyxel Networks launched the XMG1915 series – a family of smart managed switches designed to provide small businesses and professional home users (prosumers) with the throughput and versatility needed to support today’s high bandwidth applications and services. With the growth…

Samsung Reports Larger Profit Drop Than Expected

Samsung’s fourth-quarter profits far worse than expected but still company’s best results in five quarters, amidst signs of chip recovery This article has been indexed from Silicon UK Read the original article: Samsung Reports Larger Profit Drop Than Expected

Syrian group Anonymous Arabic distributes stealthy malware Silver RAT

A hacker group that calls itself Anonymous Arabic is distributing a stealthy remote access trojan called Silver RAT. Cyfirma researchers observed threat actors called ‘Anonymous Arabic’ distributing a C# remote access trojan called Silver RAT. The malware supports multiple capabilities, including bypassing…

Analysis of OT cyberattacks and malwares

The Digital revolution has transformed our world, and its impact is particularly evident in the realm of Operational Technology (OT), from Industrial Control Systems to power grids and water treatment plants. They all have very critical infrastructure and cyber-attacks on…

Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer

Threat actors are resorting to YouTube videos featuring content related to cracked software in order to entice users into downloading an information stealer malware called Lumma. “These YouTube videos typically feature content related to cracked applications, presenting users with similar…

New decryptor for Babuk Tortilla ransomware variant released

Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor. This article has been indexed from Cisco Talos Blog…

Accenture Buys 6point6 to Expand Cyber Portfolio

Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading technology consultancy specializing in cloud, data, and cybersecurity.  This acquisition, announced on October 31, 2023, significantly enhances Accenture’s capabilities in…

Surge in Open Source Malware Stealing Login Credentials & Sensitive Data

Over the decade, Python has been dominating the programming languages and consistently growing with open-source love.  Numerous popular Python projects exist that are used by millions of users. However, besides this, in recent times, it’s been noted that open-source malware…

Incorporating Mobile Threat Defense into Your Device Management Ecosystem

In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and advanced communication tools, remote work has become the new norm for countless professionals. This transition hasn’t just been about convenience;…

If you prepare, a data security incident will not cause an existential crisis

Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an immediate and overwhelming feeling that the company…

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns

Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations must act now to prevent further damaging losses. By Mathew […] The post AI And Ad Fraud: Growing Risks for…

Bolster an Organizational Cybersecurity Strategy with External Data Privacy

Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole and incentivize top talent to run their business. They also […] The post Bolster an Organizational Cybersecurity Strategy with External…

Ransomware hackers threaten to send SWAT teams to victimized patients

In recent times, cybercriminals have shifted their tactics, moving beyond the traditional ransomware attacks on corporate and government networks. Previously, their focus involved encrypting files and demanding ransoms. However, a new and alarming trend has emerged, wherein criminals are now…

Understanding zero-trust design philosophy and principles

In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. Vachon explores challenges in…

The growing challenge of cyber risk in the age of synthetic media

As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses the digital risk of…

Accelerate essential cyber hygiene for your small business

Think you’re too small to experience a cyber attack? That’s not the case. In fact, cyber threat actors (CTAs) are increasingly setting their sights on small businesses. If successful, their attack attempts can be devastating. Fortunately, the Center for Internet…

Securing AI systems against evasion, poisoning, and abuse

Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In their latest publication, NIST researchers and their partners highlight these AI and machine learning vulnerabilities. Taxonomy…

NSFOCUS named a Major Player in IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment

SANTA CLARA, Calif., January 9, 2024 – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced that NSFOCUS has been named a Major Player in the IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment (doc #US50302323,…

Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov

The post Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov appeared first on AI Enabled Security Automation. The post Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov appeared first on Security Boulevard. This article has been…

Craig Newmark Philanthropies – Celebrating 30 Years of Support for Digital Rights

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF has been awarded a new $200,000 grant from Craig Newmark Philanthropies to strengthen our cybersecurity work in 2024. We are especially grateful this year, as it…

VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities

Discover what vulnerabilities were exploited in the first week of 2024 — including new and existing ones from Ivanti, Apache, and more. The post VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities appeared first on eSecurity Planet.…

Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications

Documents belonging to the Swiss Air Force were leaked on the dark web as a result of cyberattack on a US security provider. Documents belonging to the Swiss Air Force were leaked on the dark web after the US security…

YouTube Channels Hacked to Spread Lumma Stealer via Cracked Software

By Waqas Lumma Stealer, a well-known threat to user credentials, has been actively promoted on the dark web and Telegram channels since 2022. This is a post from HackRead.com Read the original post: YouTube Channels Hacked to Spread Lumma Stealer…

Privacy Expert Weighs In On If Users Should Delete Their Facebook Profiles

The post Privacy Expert Weighs In On If Users Should Delete Their Facebook Profiles appeared first on Facecrooks. Facebook may be one of the world’s largest social media companies, but its policies and philosophy on privacy stems largely from one…

GenAI could make KYC effectively useless

KYC, or “know your customer,” is a process intended to help financial institutions, fintech startups and banks verify the identity of their customers. Not uncommonly, KYC authentication involves “ID images,” or cross-checked selfies used to confirm a person is who…

Easy Firewall Implementation & Configuration for Small and Medium Businesses

Big corporations are not the only ones that have to worry about cybersecurity. Small and medium businesses (SMBs) are routinely targeted to steal passwords, payment information, email content, and more. A good firewall is important not only to protect your…

USENIX Security ’23 – ‘Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale’

Authors/Presenters: Michele Campobasso, Luca Allodi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations…

Vulnerability Summary for the Week of January 1, 2024

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info 7-card — fakabao A vulnerability has been found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this vulnerability is an unknown functionality…

How to become an incident responder: Requirements and more

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: How to become an incident responder: Requirements…

Mastering the ‘cd’ Command: Tips and Tricks for Efficient Directory Navigation

Navigating through directories is a fundamental aspect of working in a command-line interface, and the ‘cd’ command plays a crucial role in this process. In this blog post, we’ll explore various tips and tricks to enhance your efficiency when using…

Gen AI could make KYC effectively useless

KYC, or “Know Your Customer,” is a process intended to help financial institutions, fintech startups and banks verify the identity of their customers. Not uncommonly, KYC authentication involves “ID images,” or cross-checked selfies used to confirm a person is who…

New NIST report sounds the alarm on growing threat of AI attacks

NIST releases a critical guide detailing defenses against sophisticated adversarial AI attacks, aiming to secure machine learning systems across industries. This article has been indexed from Security News | VentureBeat Read the original article: New NIST report sounds the alarm…

Randall Munroe’s XKCD ‘Range Safety’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2876/”> <img alt=”” height=”272″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/91cdcc28-01cd-40a0-b74d-a4144e69311a/range_safety.png?format=1000w” width=”565″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Range Safety’ appeared first on Security Boulevard. This…

Embracing the Virtual: The Rise and Role of vCISOs in Modern Businesses

  In recent years, the task of safeguarding businesses against cyber threats and ensuring compliance with security standards has become increasingly challenging. Unlike larger corporations that typically employ Chief Information Security Officers (CISOs) for handling such issues, smaller businesses often…

AsyncRAT Infiltrates Key US Infrastructure Through GIFs and SVGs

By Deeba Ahmed Undetected for Over 11 Months, AsyncRAT Lurked on Systems of Sensitive US Agencies with Critical Infrastructures, reports the… This is a post from HackRead.com Read the original post: AsyncRAT Infiltrates Key US Infrastructure Through GIFs and SVGs…

Grab 9 Ethical Hacking Courses for $25 and Improve Your Business Security

Your customers expect you to keep their data secure, and this collection of video courses covers everything you need to know about cybersecurity. This article has been indexed from Security | TechRepublic Read the original article: Grab 9 Ethical Hacking…

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. All four pleaded guilty to conspiracy and racketeering charges. But…

LoanDepot hit by suspected ransomware attack

Mortgage and loan giant LoanDepot said Monday it is experiencing a cyberattack and that it’s “working diligently to restore normal business operations as quickly as possible.” The Irvine, Calif.-based company said in a brief statement on its cybersecurity incident page…

Apache OFBiz zero-day pummeled by exploit attempts after disclosure

Issue has been patched so be sure to check your implementations SonicWall says it has observed thousands of daily attempts to exploit an Apache OFBiz zero-day for nearly a fortnight.… This article has been indexed from The Register – Security…

LastPass Enforces 12-Character Master Password Limit For All

After introducing the requirement as an optional security feature for some time, LastPass has now… LastPass Enforces 12-Character Master Password Limit For All on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has…

NIST: Better Defenses are Needed for AI Systems

The accelerating development and expanding deployment of AI systems is creating significant security and privacy risks that aren’t being mitigated by modern solutions, according to a research paper from the U.S. National Institute of Standards and Technology (NIST). Predictive and…

Infinispan Insights: Security Basics and Secured Caches

Security in a Nutshell When we talk about security, there are two main things to consider: proving who you are (authentication) and deciding what you’re allowed to do (authorization). These tasks are managed by one or more security realms. Authentication…

CISA Adds Six Known Exploited Vulnerabilities to Catalog

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-38203 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability CVE-2023-29300 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability CVE-2023-27524 Apache Superset Insecure Default Initialization of Resource Vulnerability CVE-2023-41990 Apple…

USENIX Security ’23 – Zixin Wang, Danny Yuxing Huang, Yaxing Yao – ‘Exploring Tenants’ Preferences of Privacy Negotiation in Airbnb’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

Deceptive Cracked Software Spreads Lumma Variant on YouTube

FortiGuard Labs uncovered a threat group using YouTube channels to spread Private .NET loader for Lumma Stealer 4.0. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deceptive Cracked Software Spreads Lumma…

Google malware exploit allows hackers to access accounts without passwords

Accessing an online account typically requires a username and password, but cybersecurity researchers at CloudSEK have uncovered a disturbing trend where hackers can gain unauthorized entry into Google accounts without the need for a password. This illicit method exploits malware,…

Cyqur Launches A Game-Changing Data Encryption and Fragmentation Web Extension

By Owais Sultan The web extension, patented in the U.S. and U.K., is now available for pre-order in a limited, pre-sale event. This is a post from HackRead.com Read the original post: Cyqur Launches A Game-Changing Data Encryption and Fragmentation…

Saudi Ministry exposed sensitive data for 15 months

Saudi Ministry of Industry and Mineral Resources (MIM) had an environment file exposed, opening up sensitive details for anybody willing to take them. The Cybernews research team believes that the sensitive data was accessible for 15 months. An environment (env.)…

DOE Puts Up $70 Million to Secure US Energy Infrastructure

The federal government will spend as much as $70 million for technologies that will create a more resilient energy delivery infrastructure that is better protected against a range of threats, including from cybercriminals. The U.S. Department of Energy this month…

xDedic Marketplace Admin and Operators Arrested

In a landmark victory for cybersecurity, the xDedic Marketplace, a notorious haven for cybercrime, has been shut down.  This international operation, spearheaded by the U.S. Attorney’s Office, FBI, IRS-CI, and a consortium of law enforcement agencies from Belgium, Ukraine, and…

Turkish Cyberspies Targeting Netherlands

Turkish state-sponsored group Sea Turtle has been targeting multiple organizations in the Netherlands for espionage. The post Turkish Cyberspies Targeting Netherlands appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: Turkish Cyberspies…

QNAP Patches High-Severity Flaws in QTS, Video Station, QuMagie, Netatalk Products

QNAP has released patches for a dozen vulnerabilities in its products, including several high-severity flaws. The post QNAP Patches High-Severity Flaws in QTS, Video Station, QuMagie, Netatalk Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Cancer Hospital Suffers Ransomware Attack, Hackers Threaten to Swat Patients

Harm patients if the medical facilities don’t pay Extortionists are now threatening to harm hospital patients if the medical facilities don’t pay the thieves’ ransom demands. They do this by reporting bomb threats or other fictitious reports to the police,…

Anthropic Pledges to Not Use Private Data to Train Its AI

  Anthropic, a leading generative AI startup, has announced that it would not employ its clients’ data to train its Large Language Model (LLM) and will step in to safeguard clients facing copyright claims. Anthropic, which was established by former…

Web3: Championing Digital Freedom and Safeguarding Liberty in the Modern Era

  In an era defined by technological progress shaping our daily lives, Web3 emerges as a beacon of hope and promise, akin to early American pioneers like Thomas Jefferson who established governance systems to safeguard public liberty. Going beyond mere…

AsyncRAT Malware Attacking the US Infrastructure for 11 Months

AsyncRAT is an open-source remote access Trojan (RAT) malware known for its ability to provide unauthorized access and control over infected systems. It was released in 2019.  Hackers use it actively for various malicious purposes, including:- Cybersecurity researchers at AT&T…

British Library: Finances Remain Healthy As Ransomware Recovery Continues

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: British Library: Finances Remain Healthy As Ransomware Recovery Continues

After Injecting Cancer Hospital With Malware, Crims Threaten To Swat Patients

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: After Injecting Cancer Hospital With Malware, Crims Threaten To…

How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry

Organizations in different industries may approach security automation from a different entry point, but the requirements for an automation platform are consistent across use cases. The post How to Get Started with Security Automation: Consider the Top Use Cases within…

NIST: No Silver Bullet Against Adversarial Machine Learning Attacks

NIST has published guidance on adversarial machine learning (AML) attacks and mitigations, warning that there is no silver bullet. The post NIST: No Silver Bullet Against Adversarial Machine Learning Attacks appeared first on SecurityWeek. This article has been indexed from…

Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack

Self-hosted GitHub Actions runners could allow attackers to inject malicious code into repositories, leading to supply chain attacks. The post Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack  appeared first on SecurityWeek. This…

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass security software and stealthily launch hidden applications. “The developers operate on multiple hacker forums and social media platforms, showcasing an…

Here’s How To Steer Clear Of QR Code Hacking

  QR codes, present for years and widely embraced during COVID-19, offer great benefits. Yet, cybercriminals exploit them, creating malicious QR codes to unlawfully access your personal and financial data. These tampered codes pose a threat, potentially leading to unauthorised…

Privacy at Stake: Meta’s AI-Enabled Ray-Ban Garners’ Mixed Reactions

  There is a high chance that Meta is launching a new version of Ray-Ban glasses with embedded artificial intelligence assistant capabilities to revolutionize wearable technology. As a result of this innovation, users will have the ability to process audio…

Orrick Data Breach: Law Firm Dealing with Data Breaches Hit by One

An international law firm assists businesses impacted by security events has experienced a cyberattack, where it compromised the sensitive health information of hundreds of thousands of data breach victims.  Orrick, Herrington & Sutcliffe, the San Francisco-based company revealed last week…

Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms

Turkey-aligned espionage group Sea Turtle has been conducting campaigns targeting Dutch telecommunication and media organizations This article has been indexed from www.infosecurity-magazine.com Read the original article: Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms

Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities

By Waqas NIST Unveils Insights on AI Vulnerabilities and Potential Threats.w This is a post from HackRead.com Read the original post: Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities This article has been indexed from Hackread – Latest Cybersecurity…

Alkem Laboratories Future-Proofs Security Infrastructure with Check Point Software Technologies

Alkem Laboratories is a leading pharmaceutical company with over 23 manufacturing facilities in India and the United States of America. For over 50 years, Alkem has focused their 500 scientists working across five R&D centers on innovations aligned with the…

British Library: Finances remain healthy as ransomware recovery continues

Authors continue to lose out on owed payments as rebuild of digital services drags on The British Library is denying reports suggesting the recovery costs for its 2023 ransomware attack may reach highs of nearly $9 million as work to…

SEC Cyber Incident Reporting Rules Pressure IT Security Leaders

As the SEC gets tough on businesses’ cybersecurity posture, IT security leaders will need to beef up incident response plans. The post SEC Cyber Incident Reporting Rules Pressure IT Security Leaders appeared first on Security Boulevard. This article has been…

DoJ charged 19 individuals in a transnational cybercrime investigation xDedic Marketplace

19 individuals worldwide were charged in a transnational cybercrime investigation of the now defunct xDedic marketplace. The U.S. DoJ charged 19 individuals worldwide for their role in the operations of the now-defunct xDedic Marketplace. In January 2019, law enforcement agencies in the US…

Cyber Security Today, Jan. 8, 2024 – How a Spanish cellular carrier’s network was knocked offline, and more

This episode reports on basic cybersecurity oversights that led to the hacking of a teclo, the increased number of victims of a US law firm hack, a data breach at a Canadian provider of midwive This article has been indexed…

Beirut Airport Screens Hacked with Anti-Hezbollah Message

By Deeba Ahmed The most recent cyber attack occurs against the backdrop of escalating tensions between Lebanon and Israel. This is a post from HackRead.com Read the original post: Beirut Airport Screens Hacked with Anti-Hezbollah Message This article has been…

Second Interdisciplinary Workshop on Reimagining Democracy

Last month, I convened the Second Interdisciplinary Workshop on Reimagining Democracy (IWORD 2023) at the Harvard Kennedy School Ash Center. As with IWORD 2022, the goal was to bring together a diverse set of thinkers and practitioners to talk about…

CISO Conversations: Jason Rebholz and Jason Ozin From the Insurance Sector

SecurityWeek interviews two CISOs from the insurance sector: Jason Rebholz at Corvus Insurance and Jason Ozin at UK-based PIB Group. The post CISO Conversations: Jason Rebholz and Jason Ozin From the Insurance Sector appeared first on SecurityWeek. This article has…

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the past two years.” This stagnation in strategy adaptation can be…

Debian and Ubuntu Fixed OpenSSH Vulnerabilities

Debian and Ubuntu have released security updates for their respective OS versions, addressing five flaws discovered in the openssh package. In this article, we will delve into the intricacies of these vulnerabilities, shedding light on their nature and the recommended…

Tesla Recalls 1.6 Million Cars In China Over Autopilot Issues

Tesla recalls more than 1.6 million vehicles in China over Autopilot safety issues, following similarly massive recall in US last month This article has been indexed from Silicon UK Read the original article: Tesla Recalls 1.6 Million Cars In China…