Category: EN

Review: Engineering-grade OT security: A manager’s guide

Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software products…

Country takes help of Blackhat Hackers infiltrating government websites

When a company’s website falls victim to hacking, conventional practice dictates that its IT staff or business leaders seek the assistance of forensic experts in cybersecurity to navigate negotiations with hackers and mitigate the situation. However, the Philippines has taken…

A Guide to Guarding Against Ransomware Attacks in 2024

In the ever-evolving landscape of cybersecurity, the threat of ransomware looms large. As we step into 2024, the sophistication and frequency of ransomware attacks continue to rise, making it imperative for individuals and organizations to adopt proactive measures to defend…

SentinelOne acquires Peak XV-backed PingSafe for over $100 million

SentinelOne’s deal to acquire PingSafe valued the Peak XV-backed young startup at over $100 million, two sources familiar with the matter told TechCrunch, in one of the strongest and fastest deals emerging from India. The New York Stock Exchange-listed AI…

AuthLogParser: Open-source tool for analyzing Linux authentication logs

AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs (auth.log). The tool examines the auth.log file, extracting crucial details like SSH logins, user creations, event names, IP addresses, among others.…

North Korea’s Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023

Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea) have plundered at least $600 million in cryptocurrency in 2023. The DPRK “was responsible for almost a third of all funds stolen in crypto attacks…

Uncovering the hidden dangers of email-based attacks

Email-based attacks have evolved beyond traditional spam and phishing attempts. Cybercriminals now employ sophisticated tactics such as spear-phishing, whaling, and business email compromise (BEC), posing a significant threat to businesses of all sizes. Email attacks can result in financial losses,…

A cyber attack hit the Beirut International Airport

A cyber attack hit the Beirut International Airport, Rafic Hariri (Lebanon), threat actors breached the Flight Information Display System (FIDS). Threat actors hit the Beirut International Airport Rafic Hariri in Lebanon and breached the Flight Information Display System (FIDS). Rafic…

USENIX Security ’23 – Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles – ‘Exploring Privacy And Incentives Considerations In Adoption Of COVID-19 Contact Tracing Apps’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

North Korean Actors Behind $600M in Crypto Thefts: TRM Labs

North Korean Hackers According to a TRM Labs analysis, hackers with ties to North Korea were responsible for one-third of all cryptocurrency exploits and thefts last year, taking away about $600 million in cash. The blockchain analytics company claimed on…

Cybercriminals Exploit X Gold Badge, Selling Compromised Accounts on Dark Web

 A recent report highlights the illicit activities of cybercriminals exploiting the “Gold” verification badge on X (formerly Twitter). Following Elon Musk’s acquisition of X in 2022, a paid verification system was introduced, allowing regular users to purchase blue ticks. Additionally,…

Google Removes Foreign eSIM Apps Airola and Holafly from PlayStore

Google has removed Airola and Holafly from its PlayStore for Indian users due to their sale of international SIM cards without the necessary authorizations. The decision came from the department of telecommunications (DoT), which also contacted internet service providers to…

Prior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant

  Kyivstar experienced a large-scale malfunction in December 2023, resulting in the outage of mobile communications and the internet for about 24 million users for several days.  How? Russian hackers broke into the Ukrainian telecommunications giant’s system in May 2023.…

Iranian crypto exchange Bit24.cash leaks user passports and IDs

Bit24.cash has inadvertently exposed sensitive data belonging to nearly 230,000 users, as revealed by Cybernews research. Due to its limited access to foreign financial markets, Iran has embraced cryptocurrency significantly. Last year, Iranian crypto exchanges facilitated transactions totaling nearly $3…

Security Affairs newsletter Round 453 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Experts…

Turkish Sea Turtle APT targets Dutch IT and Telecom firms

Sea Turtle cyber espionage group targeted telco, media, ISPs, IT service providers, and Kurdish websites in the Netherlands. Researchers from Dutch security firm Hunt & Hackett observed Sea Turtle cyber espionage group (aka Teal Kurma, Marbled Dust, SILICON and Cosmic…

Week in review: 15 open-source cybersecurity tools, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Wi-Fi 7’s mission-critical role in enterprise, industrial networking In this Help Net Security interview, Tiago Rodrigues, CEO at Wireless Broadband Alliance, discusses the transformative world…

FAQ: What Is DFARS Compliance and How Does It Work?

The Defense Federal Acquisition Regulation Supplement, better known as DFARS, has significance for contractors working with the Department of Defense (DoD). Our intention is to offer a comprehensive perspective on DFARS in the context of cybersecurity, its various clauses, and…

Three Years After January 6th: The Insurrection’s Impact on U.S. Democracy

Three years ago, on January 6, 2021, the U.S. Capitol was stormed by a mob intent on overturning the results of the 2020 Presidential Election. This event — the January 6th insurrection — was a direct attack on the democratic…

Explore Redis for User Session Management on AWS Elasticache

In the bustling digital marketplace, web applications are like vibrant cities, constantly humming with activity as users come and go. Just as cities use various systems to keep track of their inhabitants and visitors, web applications rely on user session…

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds

Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at […] The post Overcoming Multi-Cloud Security Challenges: The Power of…

USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’

Authors/Presenters: Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons“ Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the…

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe

What are some of the key cybersecurity trends that people and organizations should have on their radars this year? This article has been indexed from WeLiveSecurity Read the original article: Cybersecurity trends and challenges to watch out for in 2024…

Experts spotted a new macOS Backdoor named SpectralBlur linked to North Korea

Researchers discovered a macOS backdoor, called SpectralBlur, which shows similarities with a North Korean APT’s malware family. Security researcher Greg Lesnewich discovered a backdoor, called SpectralBlur, that targets Apple macOS. The backdoor shows similarities with the malware family KANDYKORN (aka SockRacket), which was…

Merck settles with insurers regarding a $1.4 billion claim over NotPetya damages

Merck has resolved a dispute with insurers regarding a $1.4 billion claim arising from the NotPetya malware incident. Merck and its insurers have agreed with a $1.4 billion claim arising from the large-scale NotPetya cyberattack. Merck & Co., Inc., known…

23andMe Faces Legal Backlash Over Data Breach and Blames Victims

Facing a deluge of more than 30 lawsuits from individuals impacted by a substantial data breach, genomics company 23andMe has taken a defensive stance by placing responsibility on the victims themselves. The breach came to light in October when customer…

Orbit Chain Loses $86M in Cross-Chain Bridge Hack

  Orbit Chain, a South Korean platform designed to act as a multi-asset blockchain hub, revealed a massive breach on December 31, 2023. The company disclosed an “unidentified access to Orbit Bridge,” its decentralised cross-chain technology, which resulted in the…

Estes Declines Ransom Demand Amidst Personal Data Breach and Theft

  Estes Express Lines, a major private freight shipping company in the United States, has notified over 20,000 customers about a security breach where their personal information was stolen by unknown hackers. The company revealed that on October 1, 2023,…

Russia Hacks Surveillance Cameras to Monitor Attacks in Kyiv

During Tuesday’s intense missile and drone strikes on Ukraine’s capital, Kyiv, which left over 250,000 people without internet or electricity amid dropping winter temperatures, Russian military intelligence broke into surveillance cameras to spy on Ukrainian air defenses and Kyiv’s vital…

Law firm Orrick data breach impacted 638,000 individuals

Law firm Orrick, Herrington & Sutcliffe disclosed a data breach that took place in early 2023, which impacted roughly 600,000 individuals. The law firm Orrick, Herrington & Sutcliffe, disclosed a data breach that impacted 638,000 individuals. An authorized actor gained…

23andMe Blames Users for Recent Data Breach as It’s Hit With Dozens of Lawsuits

Plus: Russia hacks surveillance cameras as new details emerge of its attack on a Ukrainian telecom, a Google contractor pays for videos of kids to train AI, and more. This article has been indexed from Security Latest Read the original…

Regenerate and Conquer: Wolverine’s Real-Time Damage System to Dominate the Gaming Landscape

  Marvel’s Wolverine has leaked details which suggest that the game will use advanced features, even those that are not available on current PlayStation 5 hardware, to play the game. In the recent Insomniac data breach, a new rumour has…

Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a Türkiye-nexus threat actor known as Sea Turtle. “The infrastructure of the…

Pro-Iranian Hacker Group Targeting Albania with No-Justice Wiper Malware

The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come from cybersecurity company ClearSky, which said the Windows-based malware “crashes the operating system in a way that it cannot be rebooted.” The intrusions have been…

Cybersecurity for Art and Design Schools

In the digital age, art and design schools face unique cybersecurity challenges. As technology becomes increasingly integrated into creative education, these institutions must be aware… The post Cybersecurity for Art and Design Schools appeared first on Security Zap. This article…

The Role of AI in Personalized Learning

Artificial Intelligence (AI) is playing an increasingly significant role in the field of education, particularly in personalized learning. As traditional approaches to education become outdated,… The post The Role of AI in Personalized Learning appeared first on Security Zap. This…

What Is OAuth 2.0?

OAuth 2.0 is an authorization framework that enables users to safely share their data between different applications. It is an industry standard that addresses the API security concerns associated with sharing user credentials while providing simple, well-defined authorization flows for…

After injecting cancer hospital with ransomware, crims threaten to swat patients

Remember the good old days when ransomware crooks vowed not to infect medical centers? Extortionists are now threatening to swat hospital patients — calling in bomb threats or other bogus reports to the police so heavily armed cops show up…

6 Best Cybersecurity Training for Employees in 2024

Use these employee cybersecurity training courses to empower your employees for protecting company assets against evolving cyberattacks. The post 6 Best Cybersecurity Training for Employees in 2024 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Hacked U.S. healthcare provider’s data archive involved over 900,000 people

Archive was data collected by a defunct company that the parent firm had to keep for regulato This article has been indexed from IT World Canada Read the original article: Hacked U.S. healthcare provider’s data archive involved over 900,000 people

Friday Squid Blogging—18th Anniversary Post: New Species of Pygmy Squid Discovered

They’re Ryukyuan pygmy squid (Idiosepius kijimuna) and Hannan’s pygmy squid (Kodama jujutsu). The second one represents an entire new genus. As usual, you can also use this squid post to talk about the security stories in the news that I…

What Is a Firewall Policy? Steps, Examples & Free Template

Firewall policies are essential as organizations deploy better defenses. Learn how to create strong firewall policies now. The post What Is a Firewall Policy? Steps, Examples & Free Template appeared first on eSecurity Planet. This article has been indexed from…

After crippling cancer hospital with ransomware, crims threaten to swat patients

Remember the good old days when ransomware crooks vowed not to infect medical centers? Extortionists are now threatening to swat hospital patients — calling in bomb threats or other bogus reports to the police so heavily armed cops show up…

How to Build a Phishing Playbook Part 2: Wireframing

Welcome back to our series on automating phishing investigation and response with playbooks in Smart SOAR. This is a four-part series covering preparation, wireframing, development, and testing. In this part, we’ll be designing our workflow, building on top of the…

AI and Cybersecurity in 2024: What’s Changing and Why It Matters

As 2024 unfolds, the cybersecurity landscape is witnessing a notable transformation, primarily driven by the increasing integration of artificial intelligence (AI). Here’s a deeper dive into what these changes entail and their significance in the cyber world. The New Regulatory…

AI Watermarking Won’t Curb Disinformation

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Generative AI allows people to produce piles upon piles of images and words very quickly. It would be nice if there were some way to reliably distinguish…

EFF Urges Pennsylvania Supreme Court to Find Keyword Search Warrant Unconstitutional

These Dragnet Searches Violate the Privacy of Millions of Americans < div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> SAN FRANCISCO—Keyword warrants that let police indiscriminately sift through search engine databases are unconstitutional dragnets that target…

Signal, AI Generated Art Least, Amazon, Facebook Most Invasive Apps, Study

By Waqas In-depth analysis reveals concerning patterns in user data collection, with shopping and food delivery apps at the forefront. This is a post from HackRead.com Read the original post: Signal, AI Generated Art Least, Amazon, Facebook Most Invasive Apps,…

Mimecast Acquires Elevate Security to Personalize Controls

Mimecast has acquired Elevate Security to make it simpler to apply cybersecurity controls based on actual end-user behavior. The post Mimecast Acquires Elevate Security to Personalize Controls appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Strong Encryption Explained: 6 Encryption Best Practices

Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now. The post Strong Encryption Explained: 6 Encryption Best Practices appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

USENIX Security ’23 – Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang – ‘Combating Robocalls With Phone Virtual Assistant Mediated Interaction’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

U.S DOE Announces $70 Million Funding for Improving

Funding that will support research into tech Today, the U.S. Department of Energy (DOE) announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a variety…

Law Firm Orrick Reveals Extensive Data Breach, Over Half a Million Affected

Global law firm Orrick, Herrington & Sutcliffe discloses a data breach that affects a whopping $600,000 individuals. The post Law Firm Orrick Reveals Extensive Data Breach, Over Half a Million Affected appeared first on SecurityWeek. This article has been indexed…

Merck Settles NotPetya Insurance Claim, Leaving Cyberwar Definition Unresolved

In a landmark case that blurs the lines between cyber and kinetic warfare, Merck reached a settlement with insurers over a $1.4 billion claim stemming from the NotPetya malware attack. The post Merck Settles NotPetya Insurance Claim, Leaving Cyberwar Definition…

SpectralBlur: New macOS Backdoor Threat from North Korean Hackers

Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that has been attributed to North Korean threat actors. “SpectralBlur is a moderately capable backdoor that can upload/download files, run a shell, update its…

Data Breached firm blames customers for reusing passwords

23andMe, renowned for its DNA testing and analysis services, has issued a statement placing blame on its users for a data breach that occurred last year. The genomics company openly admitted that its users were not adequately securing their accounts…

The source code of Zeppelin Ransomware sold on a hacking forum

A threat actor announced the sale of the source code and a cracked version of the Zeppelin ransomware builder for $500. Researchers from cybersecurity firm KELA reported that a threat actor announced on a cybercrime forum the sale of the source code and…

19 xDedic Cybercrime Market Users and Admins Face Prison

The dark web site’s infrastructure was taken down in 2019 following an international law enforcement operation This article has been indexed from www.infosecurity-magazine.com Read the original article: 19 xDedic Cybercrime Market Users and Admins Face Prison

Alert: BlackSuit Ransomware Strikes US Schools – Defend With These Security Measures

The Ransomware Strikes on U.S Schools – Analysis The BlackSuit ransomware cartel has claimed its first school district… The post Alert: BlackSuit Ransomware Strikes US Schools – Defend With These Security Measures appeared first on Hackers Online Club (HOC). This…

In Other News: US Ransomware Attacks, 23andMe Blames Victims, Nuclear Waste Hacking Attempt

Noteworthy stories that might have slipped under the radar: report on US ransomware attacks, 23andMe blames victims for hack, nuclear waste company targeted. The post In Other News: US Ransomware Attacks, 23andMe Blames Victims, Nuclear Waste Hacking Attempt appeared first…

Terrorism Tsar Warns Of AI Chatbot Radicalisation Risk

Government advisor on terror legislation, Jonathan Hall, says new laws needed to counter threat of radicalisation by AI chatbots This article has been indexed from Silicon UK Read the original article: Terrorism Tsar Warns Of AI Chatbot Radicalisation Risk

Ukraine: Russia Hacked Webcams To Aid Missile, Drone Strikes On Kyiv

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Ukraine: Russia Hacked Webcams To Aid Missile, Drone Strikes…

A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting

I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges.   Get an in-depth understanding of the do’s and don’ts in incident response as Dragoș explains how to avoid the most common mistakes…

BreachForums boss busted for bond blunders – including using a VPN

Fitzpatrick faces potentially decades in prison later this month, so may as well get some foreign Netflix in beforehand The cybercriminal behind BreachForums was this week arrested for violating the terms of his pretrial release and will now be held…

Open AI Moves to Minimize Regulatory Risk on Data Privacy in EU

  While the majority of the world was celebrating the arrival of 2024, it was back to work for ChatGPT’s parent company, OpenAI.  After being investigated for violating people’s privacy, the firm is believed to be rushing against the clock…

Unveiling Free VPN Risks: Protecting Online Privacy and Security

  If you’re seeking enhanced security and privacy for your online activities, you might be considering the use of a Virtual Private Network (VPN). Virtual Private Networks (VPNs) are specifically crafted to accomplish this task.  A quality VPN channels your…

New ‘SpectralBlur’ macOS Backdoor Linked to North Korea

SpectralBlur is a new macOS backdoor that shows similarities with North Korean hacking group’s KandyKorn malware. The post New ‘SpectralBlur’ macOS Backdoor Linked to North Korea appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Wordfence Intelligence Weekly WordPress Vulnerability Report (December 18, 2023 to December 31, 2023)

🎉Wordfence just launched its bug bounty program. For the first 6 months, all awarded bounties receive a 10% bonus. View the announcement to learn more now! Over the last two weeks, there were 263 vulnerabilities disclosed in 217 WordPress Plugins…

How To Use AzureSignTool to Sign Executables With Azure DevOps

AzureSignTool is a code-signing utility that organizations use to secure their software. This signing tool is compatible with all major executable files and works impeccably with all OV and EV code signing certificates.  But, it’s mostly used with Azure DevOps…

Best of 2023: Enterprises Are Getting Better at Breach Prevention. But Attackers Are Getting Better, Too.

2023 ForgeRock Breach Report underscores the need for AI-powered identity We are excited to announce the release of our fifth annual ForgeRock Identity Breach Report. Our goal each year is to discover what’s trending — how enterprises are being breached,…

How a Regional Credit Union Reinvented Email Security with Votiro Cloud

The Client Located in the southeast U.S., this regional Credit Union boasts over a million members across 100+ branches and handles over $10 billion in assets. They provide a comprehensive range of financial services from basic banking to insurance. If…

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

Ukrainian authorities revealed that Russia-linked APT Sandworm had been inside telecom giant Kyivstar at least since May 2023. Russia-linked APT group Sandworm was inside Ukrainian telecoms giant Kyivstar from at least May 2023, the head of Ukraine’s Security Service of Ukraine’s…

US Says 19 People Charged Following 2019 Takedown of xDedic Cybercrime Marketplace

Justice Department says 19 people involved in the xDedic cybercrime marketplace have been charged to date following its 2019 takedown. The post US Says 19 People Charged Following 2019 Takedown of xDedic Cybercrime Marketplace appeared first on SecurityWeek. This article…