Category: EN

Apple Settles Lawsuit Concerning iTunes Gift Card Scam

Agreement reached with Apple to settle a lawsuit that alleged it knowingly let scammers exploit iTunes gift cards, and kept stolen funds This article has been indexed from Silicon UK Read the original article: Apple Settles Lawsuit Concerning iTunes Gift…

CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library

By Waqas CISA Urges Swift Action as Two Critical Vulnerabilities Emerge. This is a post from HackRead.com Read the original post: CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library This article has been indexed from Hackread –…

Mastering the Art of Cyber Resilience in Operational Technology

I recently joined industry colleagues and the World Economic Forum in publishing, “Unlocking Cyber Resilience in Industrial Environments: Five Principles.” It’s a comprehensive guide designed to enhance cybersecurity in operational technology (OT) environments. Our white paper underscores the significance of…

Millions Still Haven’t Patched Terrapin SSH Protocol Vulnerability

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Millions Still Haven’t Patched Terrapin SSH Protocol Vulnerability

Estes Express Lines Says Personal Data Stolen In Ransomware Attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Estes Express Lines Says Personal Data Stolen In Ransomware…

Infostealer malware, weak password leaves Orange Spain RIPE for plucking

No 2FA or special characters to prevent database takeover and BGP hijack A weak password exposed by infostealer malware is being blamed after a massive outage at Orange Spain disrupted around half of its network’s traffic.… This article has been…

A Delhi Lawyer’s Encounter Exposes Hidden Perils of SIM Swap Scam

  In the contemporary landscape dominated by digital interconnectedness, the escalating menace of cybercrime has assumed unprecedented proportions. The latest threat on the horizon is the insidious ‘SIM Swap’ scam, an advanced scheme exploiting vulnerabilities in the telecommunications system. In…

Resecurity Identifies AI Tool Being Used to Compromise Business Email

Resecurity revealed the GXC Team cybercriminal syndicate developed a tool that uses AI to generate invoices that are embedded within a BEC attack. The post Resecurity Identifies AI Tool Being Used to Compromise Business Email appeared first on Security Boulevard.…

SpaceX Illegally Fired Staff Critical Of Elon Musk, Says US Agency

National Labor Relations Board (NLRB) alleges SpaceX illegally fired staff who in 2022 had denounced Elon Musk’s behaviour This article has been indexed from Silicon UK Read the original article: SpaceX Illegally Fired Staff Critical Of Elon Musk, Says US…

Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its sort in China, where OpenAI’s popular chatbot is not legally available, and Beijing has been tightening down on foreign AI.…

Crooks hacked Mandiant X account to push cryptocurrency scam

The X account of cybersecurity giant Mandiant was hacked, attackers used it to impersonate the Phantom crypto wallet and push a cryptocurrency scam. Crooks hacked the X account of cybersecurity firm Mandiant and used it to impersonate the Phantom crypto…

As lawmakers mull outlawing poor security, what can they really do to tackle online gangs?

Headline-grabbing takedowns are nice, but long-term solutions require short-term sacrifices Comment  In some ways, the ransomware landscape in 2023 remained unchanged from the way it looked in previous years. Vendor reports continue to show a rise in attacks, major organizations…

Hacked Mandiant X Account Abused for Cryptocurrency Theft

Mandiant’s account on X, formerly Twitter, was hacked and used to lure users to a cryptocurrency phishing site. The post Hacked Mandiant X Account Abused for Cryptocurrency Theft appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Identity Crisis: 14 Million Individuals at Risk After Mortgage Lender’s Data Breach

  Mr Cooper, the private mortgage lender, has now admitted almost 14.7 million individuals’ private data has been stolen in a previous IT security breach, which resulted in the theft of their addresses and bank account numbers, but it is…

Over 1800 global banking apps targeted by 29 malware variants

In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based on a comprehensive survey conducted by security firm Zimperium, involved insights from over 2000 respondents spanning 61 countries. Outlined in…

X Account of Google Cybersecurity Firm Mandiant Hacked in Crypto Scam

By Waqas The hackers changed Mandiant’s Twitter handle from “@Mandiant” to “@phantomsolw.” This is a post from HackRead.com Read the original post: X Account of Google Cybersecurity Firm Mandiant Hacked in Crypto Scam This article has been indexed from Hackread…

Don’t get hacked! Apply the right vulnerability metrics to Kubernetes scans

Introduction This is not a beginner’s blog post. As such, we will not tell you about the importance The post Don’t get hacked! Apply the right vulnerability metrics to Kubernetes scans appeared first on ARMO. The post Don’t get hacked!…

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices. The three harmful packages, named modularseven, driftme, and catme, attracted a total of 431…

This company says AI can help design sustainable smart home appliances

Arçelik Hitachi Home Appliances is applying artificial intelligence to various aspects of its business with the aim of boosting production efficiencies. This article has been indexed from Latest stories for ZDNET in Security Read the original article: This company says…

Industrial Defender Risk Signal integrates threat intelligence and business context

Industrial Defender introduced Industrial Defender Risk Signal, its new risk-based vulnerability management (RBVM) solution. Building upon the company’s robust vulnerability assessment capabilities, Industrial Defender Risk Signal intelligently prioritizes vulnerability for highest impact, integrating threat intelligence and the user’s specific business…

Active Directory Infiltration Methods Employed by Cybercriminals – ASEC Report

Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a central component in many organizations, making it a valuable target for attackers seeking access to:- While successful infiltration allows threat…

SentinelOne acquires PingSafe to expand cloud security capabilities

SentinelOne has agreed to acquire PingSafe. The acquisition of PingSafe’s cloud native application protection platform (CNAPP), when combined with SentinelOne’s cloud workload security and cloud data security capabilities, is expected to provide companies with a fully integrated platform that drives…

Nigerian Faces $7.5m BEC Charges After Charities Are Swindled

A Nigerian man is facing a 100-year jail term after being arrested on multimillion-dollar BEC charges This article has been indexed from www.infosecurity-magazine.com Read the original article: Nigerian Faces $7.5m BEC Charges After Charities Are Swindled

OpenSSL 3.1 FIPS Module Has Been Submitted for Validation

On 2023-12-29 we have submitted our FIPS 140-3 validation report to NIST’s Cryptographic Module Validation Program (CMVP). This in no way impacts our existing FIPS 140-2 certificate which remains valid and will be maintained until its sunset date in September…

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade detection from security software. “The group’s weapon of choice is Remcos RAT, a notorious malware for remote surveillance and control, which…

Securing Gold: Assessing Cyber Threats on Paris 2024

Based on these observations and given the constantly evolving cyber threat landscape, we analysed cyber threats affecting previous editions of the Olympics, as well as the current geopolitical context to understand potential motivations of malicious actors to target this event,…

WinRAR Flaw: LONEPAGE Malware Strikes Ukrainian Firms

In the realm of cybersecurity, vigilance is paramount, and recent developments reveal a persistent threat facing Ukrainian entities. In mid-2023, the Ukrainian CERT issued advisory #6710, unmasking a threat actor identified as “UAC-0099.” This actor’s activities and arsenal of tools…

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack

American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six hours by an unknown attacker to propagate a cryptocurrency scam. As of writing, the account has been restored on the social media platform.…

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “While engaged in a threat-hunting activity…

The dynamic relationship between AI and application development

In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way applications are developed and redefining the possibilities within the tech industry. The post The dynamic relationship between AI…

15 open-source cybersecurity tools you’ll wish you’d known earlier

Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to scrutinize, modify, and adapt solutions according to their unique needs. In…

EdTech Evaluation: Choosing Secure Educational Software

In the rapidly evolving landscape of education, the incorporation of educational technology (EdTech) has become a fundamental component of modern learning environments. As educators and… The post EdTech Evaluation: Choosing Secure Educational Software appeared first on Security Zap. This article…

Consumers prepared to ditch brands after cybersecurity issues

In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research found that consumers hold nuanced perceptions regarding cybersecurity incidents and are often less…

The state of container security: 5 key steps to locking down your releases

Container technologies are rapidly transforming application development and deployment practices at many organizations. But they also present a minefield of security risks for the growing number of organizations using the technology to package and deploy modern, microservices-based applications. The post…

Mandiant loses control of X/Twitter account

The X/Twitter account of Google’s Mandiant cybersecurity service has been taken over by a hacker who is seemingly promoting a cryptocurrency scam. The incident happened very early Wednesday morning, Eastern time. As of Wednesday afternoon, the account called Mandiant was…

Building a Culture of Digital Responsibility in Schools

In today’s technologically-driven world, schools have a critical role in cultivating a culture of digital responsibility among students. This necessitates a comprehensive approach that encompasses… The post Building a Culture of Digital Responsibility in Schools appeared first on Security Zap.…

Microsoft kills off Windows app installation from the web, again

Unpleasant Christmas package lets malware down the chimney Microsoft has disabled a protocol that allowed the installation of Windows apps after finding that miscreants were abusing the mechanism to install malware.… This article has been indexed from The Register –…

USENIX Security ’23 – Bingyu Shen, Tianyi Shan, Yuanyuan Zhou – ‘Improving Logging to Reduce Permission Over-Granting Mistakes’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

How 50% of telco Orange Spain’s traffic got hijacked — a weak password

How 50% of telco Orange Spain’s traffic got hijacked — a weak password So here’s a funny story. Earlier today, I noticed Orange Spain had an outage, caused by what appeared to be a BGP hijack: https://medium.com/media/86149308c6838a9cbb08d6b650510bf2/href This manifested to Orange Spain users as service…

Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud

Crooks created a new tool that uses Artificial Intelligence (AI) for creating fraudulent invoices used for wire fraud and BEC. Resecurity has uncovered a cybercriminal faction known as “GXC Team“, who specializes in crafting tools for online banking theft, ecommerce…

Terrapin Flaw, CVE-2023-48795, Leaves 11 million SSH Servers Vulnerable

SSH Server Vulnerable to Terrapin Flaw – Analysis Security researchers from Ruhr University Bochum in Germany have identified… The post Terrapin Flaw, CVE-2023-48795, Leaves 11 million SSH Servers Vulnerable appeared first on Hackers Online Club (HOC). This article has been…

Facebook Introduces New Tool To Track The Websites You Visit

The post Facebook Introduces New Tool To Track The Websites You Visit appeared first on Facecrooks. Facebook’s business model has come under increasing pressure in recent years as consumer privacy advocates and lawmakers have demanded the company stop collecting so…

Freight giant Estes refuses to deliver ransom, says personal data opened and stolen

Pay up, or just decline to submit One of America’s biggest private freight shippers, Estes Express Lines, has told more than 20,000 customers that criminals stole their personal information.… This article has been indexed from The Register – Security Read…

SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe

SentinelOne plans to acquire PingSafe in a cash-and-stock deal that adds cloud native application protection platform (CNAPP) technologies. The post SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

Scammers Selling Twitter (X) Gold Accounts Fueling Disinfo, Phishing

By Deeba Ahmed Buy Your Verified Scam: Researchers Expose Twitter Gold Account Black Market. This is a post from HackRead.com Read the original post: Scammers Selling Twitter (X) Gold Accounts Fueling Disinfo, Phishing This article has been indexed from Hackread…

What is Adversary-in-the-Middle AITM Attack?

Imagine two friends, Alice and Bob, sending secret messages. Suddenly, a mischievous eavesdropper, Eve, intercepts their communication, reads… The post What is Adversary-in-the-Middle AITM Attack? appeared first on Hackers Online Club (HOC). This article has been indexed from Hackers Online…

CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome and Perl library flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Qlik Sense vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Below is the…

Comprehensive Guide to Fraud Detection, Management, & Analysis

Fraud is everywhere, and it’s affecting you whether you realize it or not. From fraudulent credit card charges to identity theft, fraud can cause serious financial and emotional damage. That’s why fraud detection, management, and analysis are crucial to protecting…

Hacking Protected Java-Based Programs

This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from their intellectual property…

Why Google Settles $5B Lawsuit Over User Tracking- Analysis

The Summary Analysis: What’s Google said? “Google’s motion hinges on the idea that plaintiffs consented to Google collecting… The post Why Google Settles $5B Lawsuit Over User Tracking- Analysis appeared first on Hackers Online Club (HOC). This article has been…

Randall Munroe’s XKCD ‘Iceland’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2874/”> <img alt=”” height=”454″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/3ff50f0c-3a65-4a60-9bc8-c5bff4a64e0a/image-asset.png?format=1000w” width=”325″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Iceland’ appeared first on Security Boulevard. This article…

Abnormal Security Shares Examples of Attacks Using Generative AI

Abnormal Security published examples of how cybercriminals are beginning to leverage generative AI to launch cyberattacks. The post Abnormal Security Shares Examples of Attacks Using Generative AI appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Victory! Police Drone Footage is Not Categorically Exempt From California’s Public Records Law

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Video footage captured by police drones sent in response to 911 calls cannot be kept entirely secret from the public, a California appellate court ruled last week.…

Over 100 European Banks Face Cyber Resilience Test

The European Central Bank (ECB) will undertake a stress test on 109 European banks’ cyber-attack response capabilities after IT risk management shortfalls identified This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 100 European Banks Face Cyber…

T-Mobile US Confirms SpaceX Satellite ‘Direct to Cell’ Launch

SpaceX launches first satellites that will deliver a mobile service to customers of T-Mobile US outside of cell tower range This article has been indexed from Silicon UK Read the original article: T-Mobile US Confirms SpaceX Satellite ‘Direct to Cell’…

Power of Flexible Tech: Applying Conference Room Tech to Front Lines

Guest Editorial by Luke Reeves, Content Creator at FLYMOTION As a veteran-owned end-to-end advanced technology solution provider, our team of veterans and former first responders at FLYMOTION aren’t afraid to push technology’s limits. We work with public safety, government, defense,…

Worried about online privacy and security? This browser protects you more than Firefox

Available for Linux, MacOS and Windows, the LibreWolf browser works hard to keep your privacy in check. Here’s how to install it. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Worried about…

Developers, watch your code: Official Python respository spread malicious projects

These malicious packages – deploying cyberespionage backdoors and targeting Windows and Linux systems – were found circulating via the PyPI repository. Security experts expect the problem to continue. This article has been indexed from Latest stories for ZDNET in Security…

Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Commentary: Australia’s Cyber Security Strategy 2023-2030 is a bold and far-reaching vision that will see Australia become a world leader. However, a lack of bipartisan agreement may undermine it. This article has been indexed from Security | TechRepublic Read the…

Massive Fallon Ambulance Data Breach Impacts Nearly One Million People

Transformative Healthcare announces Fallon Ambulance data breach exposed sensitive information of 911,757 customers. Fallon ceased operations in December 2022 but is still responsible for a data storage archive that hackers targeted with ransomware. The ALPHV threat group a.k.a. BlackCat, claimed…

Canadian Senator temporarily loses control of X account

The office of Canadian Senator Amina Gerba has confirmed the Quebec parliamentarian’s account on the X/Twitter social media platform was hacked this week. Walter Calderon, the Senator’s executive assistant, made the confirmation Wednesday in a telephone interview. It followed the…

CyberTalk Series: MSP Challenges: Managed Security Services with Ken Patterson

Our industry is way more complex than meets the eye. MSPs and MSSPs are not just managing their clients’ cybersecurity programs, they are also accountable to their auditors, The post CyberTalk Series: MSP Challenges: Managed Security Services with Ken Patterson…

USENIX Security ’23 – ‘Auditing Frameworks Need Resource Isolation: A Systematic Study On The Super Producer Threat To System Auditing And Its Mitigation’

Authors/Presenters: Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from…

Facebook’s New Privacy Nightmare: ‘Link History’

How stupid does he think we are? You’ll want to turn off this new app setting. The post Facebook’s New Privacy Nightmare: ‘Link History’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Flaw in Black Basta Ransomware Exploited to Create Decryptor

Researchers at cybersecurity firm Security Research Labs exploited a flaw found in the algorithm of a ransomware variant used by the high-profile threat group Black Basta to develop a decryptor that can help some victims recover their encrypted files. SRLabs…

Cloud-native cybersecurity startup Aqua Security raises $60M and remains a unicorn

Aqua Security, an Israeli cybersecurity startup that helps companies protect their cloud services, has raised $60 million in funding, extending its previously announced $135 million Series E round of funding to $195 million. Founded in 2015, Tel Aviv- and Boston-based…

Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices

FortiGuard Labs cover the attack phases of three new PyPI packages that bear a resemblance to the culturestreak PyPI package discovered earlier this year. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original…

SonicWall Buys Banyan Security For ZTNA Technology

SonicWall announces the acquisition of Banyan Security, a deal that adds zero-trust network access tooling to its product portfolio. The post SonicWall Buys Banyan Security For ZTNA Technology appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Stolen Gold X accounts are increasingly being peddled on dark web, says report

Cybercrooks have increased the number of new or stolen Gold checkmarked accounts from the X/Twitter platform offered for sale; they are a valuable way for threat actors to push links to malware on the social media site through what users…

Cyber Kidnapping picks pace in the United States

Attention to all Chinese-origin students currently participating in exchange programs in the United States: Be aware that there is a growing threat of ‘Cyber Kidnapping’ targeting individuals who are not vigilant. Hackers have been contacting parents in China, pressuring them…

Value Of Twitter/X Falls 71 Percent Since Elon Musk Takeover – Report

Another valuation cut from X/Twitter shareholder shows remarkable fall in platform’s market value since Elon Musk takeover This article has been indexed from Silicon UK Read the original article: Value Of Twitter/X Falls 71 Percent Since Elon Musk Takeover –…

Google, Meta, TikTok Russian Debts Removed From Bailiff Database – Report

Debts allegedly ‘owed’ by Google, Meta and TikTok to the Russian government have been removed from state bailiff database This article has been indexed from Silicon UK Read the original article: Google, Meta, TikTok Russian Debts Removed From Bailiff Database…

Montana Appeals, After Judge Blocked State Ban On TikTok Use

Montana Attorney General files appeal, after US judge blocked first ever state ban on use of short video-sharing app This article has been indexed from Silicon UK Read the original article: Montana Appeals, After Judge Blocked State Ban On TikTok…

Vulnerability Recap – 1/2/2024 – Barracuda ESG, Apache OfBiz Vulnerabilities Persist

Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap. The post Vulnerability Recap – 1/2/2024 – Barracuda ESG, Apache OfBiz Vulnerabilities Persist appeared first on eSecurity Planet. This article has been indexed from…

Don’t trust links with known domains: BMW affected by redirect vulnerability

Sometimes, you can’t even trust links with your own domain. As the Cybernews research team has discovered, some BMW subdomains were vulnerable to redirect vulnerability, enabling attackers to forge links leading to malicious sites through them. Cybernews researchers have discovered…

VPN to protect against DDoS attacks on Twitch

Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it…

Hacker Conversations: Runa Sandvik

SecurityWeek interviews Runa Sandvik, a cybersecurity researcher focused on protecting journalists, defenders of human rights and lawyers, The post Hacker Conversations: Runa Sandvik appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…

Several Infostealers Using Persistent Cookies to Hijack Google Accounts

A vulnerability in Google’s authentication process allows malware to restore cookies and hijack user sessions. The post Several Infostealers Using Persistent Cookies to Hijack Google Accounts appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Over 900k Impacted by Data Breach at Defunct Boston Ambulance Service

The personal information of more than 900,000 individuals was stolen in a data breach at Fallon Ambulance Service. The post Over 900k Impacted by Data Breach at Defunct Boston Ambulance Service appeared first on SecurityWeek. This article has been indexed…