Category: EN

Lancashire-Based Scamming Group Jailed in £500k Charity Fraud

  A group of charity scammers who pretended to be grocery store bucket collectors and deceived the public out of at least £500,000 have been imprisoned.  By pretending to be collectors for children’s charities such as Children In Need, Great…

Apple’s iPhone Hack Attack Warnings Spark Political Firestorm in India

By Waqas Big Tech vs. Big Brother: Apple Defies India Pressure over iPhone Hacking Alerts. This is a post from HackRead.com Read the original post: Apple’s iPhone Hack Attack Warnings Spark Political Firestorm in India This article has been indexed…

The Emerging Landscape of AI-Driven Cybersecurity Threats: A Look Ahead

While AI can significantly bolster defense mechanisms, it also equips adversaries with powerful tools to launch sophisticated cyberattacks. The post The Emerging Landscape of AI-Driven Cybersecurity Threats: A Look Ahead appeared first on SecurityWeek. This article has been indexed from…

Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service

Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker who already has access to a Kubernetes cluster to escalate their privileges. “An attacker who has compromised the Fluent Bit logging container could combine…

Best Ransomware Protection Practices for Midsize Organizations

Upscale your security with the best ransomware protection practices for midsized organizations! The post Best Ransomware Protection Practices for Midsize Organizations appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Best Ransomware…

Best of 2023: Another Password Manager Leak Bug: But KeePass Denies CVE

Two researchers report vulnerability in KeePass. But lead developer Dominik Reichl says it’s not a problem—and refuses to fix the flaw. The post Best of 2023: Another Password Manager Leak Bug: But KeePass Denies CVE appeared first on Security Boulevard. This…

LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company

LoanCare is informing 1.3 million individuals that their personal information was compromised in a data breach. The post LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company  appeared first on SecurityWeek. This article has been indexed from…

PoolParty Process Injections, SysJoker, NetSupport RAT, & More: Hacker’s Playbook Threat Coverage Round-up: December 2023

New and updated coverage for ransomware and malware variants, including NoEscape ransomware, AvosLocker ransomware, and others. The post PoolParty Process Injections, SysJoker, NetSupport RAT, & More: Hacker’s Playbook Threat Coverage Round-up: December 2023 appeared first on SafeBreach. The post PoolParty…

Mysterious Apple SoC Feature Exploited to Hack Kaspersky Employee iPhones

iOS zero-click attack targeting Kaspersky iPhones bypassed hardware-based security protections to take over devices. The post Mysterious Apple SoC Feature Exploited to Hack Kaspersky Employee iPhones appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Ohio Lottery Hit by Ransomware, Hackers Claim Theft of Employee and Player Data

The DragonForce ransomware group has taken credit for the Ohio Lottery hack, claiming to have stolen millions of data records. The post Ohio Lottery Hit by Ransomware, Hackers Claim Theft of Employee and Player Data appeared first on SecurityWeek. This…

Most Sophisticated iPhone Hack Ever Exploited Apple’s Hidden Hardware Feature

The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made it possible to even bypass pivotal hardware-based security protections erected by the company. Russian cybersecurity firm Kaspersky, which discovered the campaign at the beginning of 2023 after becoming one of the targets, described it…

Barracuda Zero-Day Used to Target Government, Tech Organizations in US, APJ

The new Barracuda ESG zero-day CVE-2023-7102 has been used by Chinese hackers to target organizations in the US and APJ region. The post Barracuda Zero-Day Used to Target Government, Tech Organizations in US, APJ appeared first on SecurityWeek. This article…

Full Fibre Arrives In UK’s Most Remote Inhabited Island

People living on Fair Isle, the UK’s most geographically remote inhabited island, have received a significant connectivity improvement. Openreach has delivered to the islanders full fibre broadband, thanks in part to funding from the Scottish Government’s R100 programme, as well…

Critical Apache OfBiz Zero-Day Let Attackers Bypass Authentication

A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used as a part of the software supply chain in Atlassian’s JIRA, which is predominantly used in several organizations. This vulnerability…

Cloud Security Optimization: A Process for Continuous Improvement

Cloud optimization is the process of correctly selecting and assigning the right resources to a workload or application with the ultimate goal of minimizing costs while improving performance and efficiency. These resources can range from computational power, memory, and storage…

Experts warn of critical Zero-Day in Apache OfBiz

Experts warn of a zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Experts warn of an authentication bypass zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. An attacker can trigger…

Amnesty confirms Apple warning: Indian journalists’ iPhones infected with Pegasus spyware

Apple’s warnings in late October that Indian journalists and opposition figures may have been targeted by state-sponsored attacks prompted a forceful counterattack from Prime Minister Narendra Modi’s government. Officials publicly doubted Apple’s findings and announced a probe into device security.…

Introduction to NTA Automatic Diversion

NTA supports configuring automatic diversion for Region/IP Group traffic alerts and Region/IP Group DDoS attack alerts. There are different diversion methods for various scenarios, including ADS Diversion, Flowspec Diversion, BGP Diversion, and Null-Route Diversion For the Region/IP Group traffic alert,…

CMMC v2.0 vs NIST 800-171: Understanding the Differences

The U.S. Defense Industrial Base (DIB) Sector is the worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements.  With…

10 Prominent Cybersecurity Acquisitions of 2023

The cybersecurity domain is undergoing rapid changes owing to the rise in frequency and complexity of cyber threats. As the digital world expands, the risk of cyberattacks is increasing, and security experts must stay vigilant to safeguard against potential breaches.…

New Rugmi Malware Loader Surges with Hundreds of Daily Detections

A new malware loader is being used by threat actors to deliver a wide range of information stealers such as Lumma Stealer (aka LummaC2), Vidar, RecordBreaker (aka Raccoon Stealer V2), and Rescoms. Cybersecurity firm ESET is tracking the trojan under the name Win/TrojanDownloader.Rugmi. “This…

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.

By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […] The post Sophisticated Cyber Threats Require a New Approach…

Unveiling the true cost of healthcare cybersecurity incidents

As healthcare organizations increasingly rely on interconnected systems, electronic health records, and telemedicine, the industry becomes a prime target for malicious actors seeking to exploit vulnerabilities. The consequences of a cybersecurity breach in healthcare are not only measured in compromised…

Vietnam hacked CCTV videos selling like hotcakes on Telegram

The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks. Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram to facilitate their nefarious…

Security takes a backseat as CTOs and CIOs lean towards AI in 2024

35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to Exclaimer. The survey results show that 2023’s biggest challenges…

How to turn shadow IT into a culture of grassroots innovation

The proliferation of generative AI tools has been compared to the dawn of the internet, the spread of smartphones and laptops, and the mass transition to cloud computing. All these advancements make it easier for individuals to adopt technology into…

5 pivotal cybersecurity trends for 2024

In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to…

India pressed Apple on state-sponsored warnings, report says

Apple’s warnings in late October that Indian journalists and opposition figures may have been targeted by state-sponsored attacks prompted a forceful counterattack from Prime Minister Narendra Modi’s government. Officials publicly doubted Apple’s findings and announced a probe into device security.…

The dawn of the autonomous enterprise is on the horizon

90% of IT decision-makers plan to deploy more automation, including AI, in the next 12 months, according to Digitate. IT leaders embrace AI-powered automation 26% of respondents plan to implement machine-operated tasks that require limited human input or fully transition…

Cybersecurity for Homeschooling Parents: A Guide

In the rapidly evolving digital landscape, homeschooling has emerged as a viable alternative for parents seeking to provide their children with a personalized education experience…. The post Cybersecurity for Homeschooling Parents: A Guide appeared first on Security Zap. This article…

Strategies for Securing Student Data in Cloud Services

In the modern era, educational institutions are increasingly turning to cloud services for storing and managing student data. However, this shift towards cloud-based solutions also… The post Strategies for Securing Student Data in Cloud Services appeared first on Security Zap.…

Life in the Swimlane with Kevin Mata, Director of Cloud Operations and Automation

The post Life in the Swimlane with Kevin Mata, Director of Cloud Operations and Automation appeared first on AI Enabled Security Automation. The post Life in the Swimlane with Kevin Mata, Director of Cloud Operations and Automation appeared first on…

SLSA Provenance Blog Series, Part 3: The Challenges of Adopting SLSA Provenance

In part 2 of the series, we dived into the internals of the provenance document to understand its content and usage. In this part, we will explore the different SLSA levels for generating provenance and go through the different challenges…

Xamalicious Android malware distributed through the Play Store

Researchers discovered a new Android malware dubbed Xamalicious that can take full control of the device and perform fraudulent actions. McAfee Mobile Research Team discovered a new Android backdoor dubbed Xamalicious that can take full control of the device and…

16 Cybersecurity leaders predict how gen AI will improve cybersecurity in 2024

With greater AI power comes greater complexity, especially for CISOs adopting generative AI. Gen AI is the power surge cybersecurity vendors need to reduce the risks of losing the AI war. Meanwhile, adversaries’ tradecraft and new ways of weaponizing AI…

Police Department Criticized For Disabling Facebook Comments After Violent Posts

The post Police Department Criticized For Disabling Facebook Comments After Violent Posts appeared first on Facecrooks. When it comes to free speech and censorship, Facebook lives in a murky legal area. Earlier this week, the police department in Everett, Washington,…

USENIX Security ’23 – Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin ‘Watch Your Watch: Inferring Personality Traits From Wearable Activity Trackers’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

Why Virtual Board Portals are the Key to Better Collaboration and Decision-Making

By Owais Sultan Meetings without paper have become a reality thanks to advanced technologies. Digital tools help companies be more efficient… This is a post from HackRead.com Read the original post: Why Virtual Board Portals are the Key to Better…

How Cache Purge Helps Keep Your Website Content Fresh and Responsive

Content Delivery Networks (CDNs) accelerate web traffic across the internet through servers residing in strategic locations (known as points of presence or PoPs) across the globe. Each PoP has a number of caching servers, each of which contains a cached…

Equitable Access to the Law Got Stronger: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It seems like a no-brainer that everyone should be able to read, copy, and share the laws we all must follow, but few things are simple in…

International Threats to Freedom of Expression: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> 2023 has been an unfortunate reminder that the right to free expression is most fragile for groups on the margins, and that it can quickly become a casualty during global conflicts.…

USENIX Security ’23 – ‘Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks On Unconstrained Keyboard Inputs’

Yazhou Tu, Liqun Shan, Md Imran Hossen, Sara Rampazzi, Kevin Butler, Xiali Hei Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated…

Randall Munroe’s XKCD ‘Definitely’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2871/”> <img alt=”” height=”461″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/2a05f663-67a0-4a51-8a67-6a93464281ca/definitely.png?format=1000w” width=”463″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Definitely’ appeared first on Security Boulevard. This article…

National Amusements Reveals Data Breach Amid Backlash Affecting 82,000+

By Waqas The company under criticism is National Amusements, the parent company of media giants such as Paramount and CBS. This is a post from HackRead.com Read the original post: National Amusements Reveals Data Breach Amid Backlash Affecting 82,000+ This…

Entro Security Newest Competitor in 2024 ‘ASTORS’ Awards Program

Entro Security, an Israeli cybersecurity startup offering secrets security and management, is pleased to announce the company has been Nominated to Compete in the 2024 ‘ASTORS’ Homeland Security, Public Safety, and Government Excellence Awards Program. As cloud services are on…

Self-Driving Cars On UK Roads By 2026, Says Transport Secretary

Government minister Mark Harper tells BBC that autonomous cars will improve road safety and personal freedom This article has been indexed from Silicon UK Read the original article: Self-Driving Cars On UK Roads By 2026, Says Transport Secretary

AI In Windows: Investigating Windows Copilot

By Yarden Shafir AI is becoming ubiquitous, as developers of widely used tools like GitHub and Photoshop are quickly implementing and iterating on AI-enabled features. With Microsoft’s recent integration of Copilot into Windows, AI is even on the old stalwart…

Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack

A new zero-day security flaw has been discovered in the Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system that could be exploited to bypass authentication protections. The vulnerability, tracked as CVE-2023-51467, resides in the login functionality and is the result…

Ransomware attack leads to identity theft of an Oakland Man

In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However, a new facet of cyber-crime has emerged, taking the form of a twist in the aftermath of a ransomware assault…

Judge Rules Twitter Violated Contract Over Failure To Pay Bonuses

Elon Musk’s Twitter (now X) violated contracts by failing to pay millions in promised bonuses, federal judge rules This article has been indexed from Silicon UK Read the original article: Judge Rules Twitter Violated Contract Over Failure To Pay Bonuses

Above 30% Apps at Risk with Vulnerable Log4j Versions

An alarming 38% of applications that use the Apache Log4j library use the versions susceptible to security vulnerabilities. One of them is a critical vulnerability, Log4Shell (CVE-2021-44228), for which patches have been available for over two years. Log4Shell is an…

Unveiling the Unseen Cybersecurity Threats Posed by Smart Devices

  The number of smart devices worldwide has surpassed the global population, with a continuous upward trend, particularly amidst remote and hybrid work settings. Ranjit Atwal, Gartner’s senior research director, attributes this surge to the increase in remote work. As…

June 2023 Review: MOVEit Exploit, UK Government’s AI Leadership Goals, NHS’ Controversial IT Project

June 2023 might have been the most thriving month for Cl0P ransomware group. Since March, the Russia-based hackers started exploiting a SQL injection vulnerability in the MOVEit file transfer service, frequently used by large organizations. However, it was not until…

Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been using Wallet Drainers for such cybercrime activities, which have seen great success in recent years.  Several techniques were used for…

Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating data breach.  On December 20th, an unidentified threat actor infiltrated their systems, gaining access for approximately 48 hours before Ubisoft’s…

Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses

  Artificial Intelligence (AI) is emerging as a marvel in the landscape of rapidly developing digital technologies along with a challenge for organizations across a wide range of industries in the growing field of digital technologies.  Automating mundane tasks and…

Predictions 2024 from cybersecurity vendors, Part 1

2024 will be a year dominated by artificial intelligence-created deepfakes and advanced phishing attacks, but also new AI-based detection applications to help defenders. These are among the predictions from companies that provide cybersecurity solutions. We’ve collected comments from over 30…

New Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these documents, attackers trick users into opening them and leading to the execution of malicious code.  While leveraging the familiarity and…

Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841

Security firm Barracuda addressed a new zero-day, affecting its Email Security Gateway (ESG) appliances, that is actively exploited by the China-linked UNC4841 group. On December 21, network and email cybersecurity firm Barracuda started releasing security updates to address a zero-day,…

Chinese Hackers Deliver Malware To Barracuda Email Security Appliances Via New Zero-Day

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Chinese Hackers Deliver Malware To Barracuda Email Security Appliances…

Cyberattack Disrupts Operations Of First American, Subsidiaries

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Cyberattack Disrupts Operations Of First American, Subsidiaries

Hackers Steal Customer Data From Europe’s Largest Parking App Operator

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Hackers Steal Customer Data From Europe’s Largest Parking App…

Smishing: SMS Phishing Attacks And How to Thwart Them

  Smishing is a fast growing version of one of the most established and lucrative scams on the internet. Smishing, like other forms of phishing, aims to trick you into revealing sensitive data and information; however, instead of email, cybercriminals…

Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes

Two issues in Google Kubernetes Engine (GKE) create a privilege escalation chain. We examine second-stage attacks which exploit the container environment. The post Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized…

Refocusing on Cybersecurity Essentials in 2024: A Critical Review

By supplementing traditional perimeter defense mechanisms with principles of data integrity, identity management, and risk-based prioritization, organizations can reduce their exposure to data breaches. The post Refocusing on Cybersecurity Essentials in 2024: A Critical Review appeared first on SecurityWeek. This…

Cyberattack Disrupts Operations of First American, Subsidiaries

A cyberattack appears to have caused significant disruption to the systems and operations of title insurer First American and its subsidiaries. The post Cyberattack Disrupts Operations of First American, Subsidiaries appeared first on SecurityWeek. This article has been indexed from…

Operation Triangulation: The last (hardware) mystery

Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs. This article has been indexed from Securelist…

2023 Year in Review: The U.S. Supreme Court’s Busy Year of Free Speech and Tech Cases

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> The U.S. Supreme Court has taken an unusually active interest in internet free speech issues. EFF participated as amicus in a whopping nine cases before the court…

Police Warn Hundreds of Online Merchants of Skimmer Infections

Law enforcement authorities in 17 countries discovered more than 400 online merchants infected with skimmers. The post Police Warn Hundreds of Online Merchants of Skimmer Infections appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Chinese Hackers Exploited New Zero-Day in Barracuda’s ESG Appliances

Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoor on a “limited number” of devices. Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within…

Elections 2024, artificial intelligence could upset world balances

Governments should recognize electoral processes as critical infrastructure and enact laws to regulate the use of generative Artificial Intelligence. Elections are scheduled in several countries worldwide in 2024, with potential geopolitical implications. Key events include the European Parliament elections in…

This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy

Apple updated its location-tracking system in an attempt to cut down on AirTag abuse while still preserving privacy. Researchers think they’ve found a better balance. This article has been indexed from Security Latest Read the original article: This Clever New…

Integris Health Data Breach Could Impact Millions

Integris Health has started informing patients of a data breach impacting their personal information. The post Integris Health Data Breach Could Impact Millions appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…

CBS Parent National Amusements Discloses Year-Old Data Breach

CBS parent company National Amusements is informing 80,000 individuals of a December 2022 data breach. The post CBS Parent National Amusements Discloses Year-Old Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

Microservices Resilient Testing Framework

Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…

Experts analyzed attacks against poorly managed Linux SSH servers

Researchers warn of attacks against poorly managed Linux SSH servers that mainly aim at installing DDoS bot and CoinMiner. Researchers at AhnLab Security Emergency Response Center (ASEC) are warning about attacks targeting poorly managed Linux SSH servers, primarily focused on…

Chinese Hackers Deliver Malware to Barracuda Email Security Appliances via New Zero-Day

Chinese hackers exploited a zero-day tracked as CVE-2023-7102 to deliver malware to Barracuda Email Security Gateway (ESG) appliances. The post Chinese Hackers Deliver Malware to Barracuda Email Security Appliances via New Zero-Day appeared first on SecurityWeek. This article has been…

A cyberattack hit Australian healthcare provider St Vincent’s Health Australia

St Vincent’s Health Australia, the largest Australian healthcare provider, suffered a data breach after a cyber attack. St Vincent’s Health Australia is the largest non-profit healthcare provider in the country, The healthcare system was hit by a cyberattack that resulted…