Category: EN

Former Facebook Engineer Says “People You May Know” Feature Fueled Child Exploitation

The post Former Facebook Engineer Says “People You May Know” Feature Fueled Child Exploitation appeared first on Facecrooks. Facebook’s algorithms are designed to help like-minded users find each another and connect. However, that mission can backfire in a big way…

Vulnerability Summary for the Week of December 18, 2023

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info 52north — 52north_wps An XXE (XML External Entity) vulnerability has been detected in 52North WPS affecting versions prior to 4.0.0-beta.11. This vulnerability allows the use of…

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #272 — Product Ops

<a class=” sqs-block-image-link ” href=”https://www.comicagile.net/comic/product-ops/”> <img alt=”” height=”548″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/af1a3173-77c7-4b3f-af0d-a3faea939039/Comic-agile_272.png?format=1000w” width=”620″ /> </a><figcaption class=”image-caption-wrapper”> via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The…

USENIX Security ’23 – Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen ‘Going Through The Motions: AR/VR Keylogging From User Head Motions’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

AI moves from theory to practice, zero trust gets real, and other 2024 predictions from Dell CTO

What does 2024 have in store? Improved gen AI ecosystems, next-level security, ‘common edge’ — plus, how quantum will support AI. This article has been indexed from Security News | VentureBeat Read the original article: AI moves from theory to…

Rhysida ransomware group hacked Abdali Hospital in Jordan

The Rhysida ransomware group claimed to have hacked Abdali Hospital, a multi-specialty hospital located in Jordan. Abdali Hospital is a multi-specialty hospital located in the modern development of Al-Abdali, Amman, Jordan. Abdali Hospital provides care to patients in numerous specialties. Apart from its general surgery section, it has…

RingGo, ParkMobile Owner EasyPark Suffers Data Breach, User Data Stolen

By Waqas ParkMobile, a globally-used parking app, is the same platform that suffered a massive data breach in 2021 when hackers leaked the data of 21 million customers. This is a post from HackRead.com Read the original post: RingGo, ParkMobile…

Wrapping up Q4 2023 : new detectors, your favorite features, and what’s coming next in GitGuardian

Unlock the latest secrets detectors, automate severity scoring, and dive into GitGuardian’s unique dev & sec collaboration features! The post Wrapping up Q4 2023 : new detectors, your favorite features, and what’s coming next in GitGuardian appeared first on Security…

Small Businesses Prime Targets for Cyberattacks: Key Signs & Defense Strategies

  In the wake of prominent cyberattacks targeting major entities such as casinos, tech giants, and power grids, there is a common misconception that small and midsize businesses are less susceptible to such threats. However, recent research conducted on over…

Data Breach Incident Affects Several Las Vegas Valley Hospitals

In another cybersecurity incident in Las Vegas, cyber actors have targeted several Las Vegas Valley hospitals which may have resulted in the compromise of their patients’ sensitive information.  The hospitals, part of the Valley Health System, include Centennial Hills, Desert…

LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware

Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…

CBS, Paramount owner National Amusements says it was hacked

National Amusements, the cinema chain and corporate parent giant of media giants Paramount and CBS, has confirmed it experienced a data breach in which hackers stole the personal information of tens of thousands of people. The private media conglomerate said…

Carbanak malware returned in ransomware attacks

Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware attacks. The cybersecurity firm NCC Group reported that in November the banking malware Carbanak was observed in ransomware attacks. The Carbanak…

EFF Membership: 2023 Year In Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Throughout the many years that EFF has been around, our goal has remained consistent: creating a future where you have your rights when you go online, and one where they are…

We’ve added more content to ZKDocs

By Jim Miller We’ve updated ZKDocs with four new sections and additions to existing content. ZKDocs provides explanations, guidance, and documentation for cryptographic protocols that are otherwise sparingly discussed but are used in practice. As such, we’ve added four new…

China stealing AI feed data from America for Spying

As per a report featured in the Wall Street Journal, there has been a notable surge in China’s illicit acquisition of extensive datasets designated for training Artificial Intelligence (AI) tools in the United States. The apparent objective behind this activity…

Surveillance Self-Defense: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s been a big year for Surveillance Self-Defense (SSD), our repository of self-help resources for helping better protect you and your friends from online spying. We’ve done a…

Cisco to Acquire Cloud Networking and Security Startup Isovalent

In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared its intent to acquire Isovalent, a trailblazer in open-source cloud-native networking and security.  This bold acquisition underscores Cisco’s steadfast commitment…

Android Malware Actively Infecting Devices to Take Full Control

Android malware infects devices to take full control for various illicit purposes like:-  By gaining complete control, threat actors can exploit the device for their illicit activities, posing significant threats to:- Cybersecurity analysts at McAfee Mobile Research recently found an…

What VCs are looking for in the next wave of cybersecurity startups

The next wave of successful startups will help companies harness GenAI to improve organizational productivity while preventing attacks. © 2023 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the…

Game Studio Ubisoft Investigates Claims of Data Security Incident

  Video gaming company Ubisoft revealed that it is looking into reports that hackers attempted to steal data this week by breaching into its networks.  Ubisoft officials were “aware of an alleged data security incident and are currently investigating. At…

OpenAI Addresses ChatGPT Security Flaw

OpenAI has addressed significant security flaws in its state-of-the-art language model, ChatGPT, which has become widely used, in recent improvements. Although the business concedes that there is a defect that could pose major hazards, it reassures users that the issue…

Ubisoft Hackers Scrambled for 900GB of Data Before Foiled

By Deeba Ahmed The cyberattack on Ubisoft came just days after hackers from the Rhysida ransomware gang targeted Insomniac Games, the developers of Spider-Man 2. This is a post from HackRead.com Read the original post: Ubisoft Hackers Scrambled for 900GB…

Best of 2023: Detecting CVE-2023-23397: How to Identify Exploitation of the Latest Microsoft Outlook Vulnerability

Microsoft recently released patches for nearly 80 new security vulnerabilities, including two zero-day exploits, CVE-2023-23397 and CVE-2023-24880. CVE-2023-23397 is an elevation-of-privilege (EoP) vulnerability in Microsoft Outlook that could allow an attacker to obtain a victim’s password hash. The vulnerability occurs…

Resecurity Released a 2024 Cyber Threat Landscape Forecast

Cybersecurity company Resecurity has published the 2024 Cyber Threat Landscape Forecast. Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 100 and government agencies worldwide, has compiled a comprehensive forecast outlining the imminent threats and novel security challenges anticipated in the…

Hackers Attacking Linux SSH Servers to Deploy Scanner Malware

Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make them vulnerable, providing opportunities to hackers for unauthorized access and potential exploitation:- Cybersecurity researchers at AhnLab Security Emergency Response Center…

UEFI Failing: What to Know About LogoFAIL Attacks

Multiple UEFI vulnerabilities can lead to Linux, Windows, and Mac exploits LogoFAIL persists across operating system reinstallations It also extends the supply chain risks to the hardware itself   Security researchers, known for their inquisitive and unconventional methods, have recently…

SLAM Attack: New Vulnerability Targets Intel, AMD, Arm CPUs

In a groundbreaking revelation, researchers from Vrije Universiteit Amsterdam have uncovered a formidable side-channel attack known as SLAM, posing a serious threat to the security of current and future CPUs manufactured by tech giants Intel, AMD, and Arm. This sophisticated…

How software engineering will evolve in 2024

Software development is currently undergoing a profound transformation, marked by a quiet yet remarkable surge in advanced automation. This impending shift promises to streamline the creation and deployment of high-quality applications on an unprecedented scale. Rather than a single technology…

Daily Malicious Files Soar 3% in 2023, Kaspersky Finds

Kaspersky reported an average of 411,000 malicious files deployed every day in 2023, according to its Security Bulletin: Statistics of the Year Report This article has been indexed from www.infosecurity-magazine.com Read the original article: Daily Malicious Files Soar 3% in…

Carbanak Banking Malware Resurfaces with New Ransomware Tactics

The banking malware known as Carbanak has been observed being used in ransomware attacks with updated tactics. “The malware has adapted to incorporate attack vendors and techniques to diversify its effectiveness,” cybersecurity firm NCC Group said in an analysis of ransomware attacks that took place in…

KnowsMore Open-source Suite For Pentesting Microsoft Active Directory

KnowsMore is an open source suite for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync). KnowsMore… The post KnowsMore Open-source Suite For Pentesting Microsoft Active Directory appeared first on Hackers Online Club (HOC). This article has been indexed…

Ledger Supply Chain Breach: $600,000 Theft Unveiled

Recent events have brought to light the Ledger supply chain breach, a cybercrime incident that led to the theft of $600,000 in virtual assets. For those who don’t know, Ledger is a company that develops hardware and software-based cryptocurrency wallets.…

The most popular passwords of 2023 are easy to guess and crack

Each year, analysts at various Internet security companies release lists of the most used (and known) passwords. These lists are based on leaked password database data. The passwords that are on these […] Thank you for being a Ghacks reader.…

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…

3 main tactics attackers use to bypass MFA

Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on systems protected…

Tackling cloud security challenges head-on

Cloud security is a critical aspect of modern computing, as businesses and individuals increasingly rely on cloud services to store, process, and manage data. Cloud computing offers numerous benefits, including scalability, flexibility, and cost efficiency, but it also introduces unique…

Verification roadblocks cause frustration for digital nomads

Digital nomads are expressing the most frustration when interacting with organizations offering services in the United States, according to Regula. This revelation comes as a surprise, given that the United States was the most frequented destination for the digital nomad…

Rising fintech trends for 2024: From A2A payments to GenAI in banking

The fintech market is undergoing a rapid shift, with the rise of new technologies, such as Open Finance, generative AI and A2A (Account-to-Account) payments having a major impact on business models, according to Juniper Research. This is combined with unprecedented…

Digital Learning Tools for Cybersecurity Education

In the field of cybersecurity education, digital learning tools have become indispensable. As the need for safeguarding sensitive information and combating cyber threats grows, the… The post Digital Learning Tools for Cybersecurity Education appeared first on Security Zap. This article…

Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security

Understanding the Basic Concept of VLANs Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. These are subsets within a Local Area Network (LAN) that partition the network into multiple distinct…

APT group UAC-0099 targets Ukraine exploiting a WinRAR flaw

The threat actor UAC-0099 is exploiting a flaw in the WinRAR to deliver LONEPAGE malware in attacks against Ukraine. A threat actor, tracked as UAC-0099, continues to target Ukraine. In some attacks, the APT group exploited a high-severity WinRAR flaw CVE-2023-38831 to…

Recent Surveillance Revelations, Enduring Latin American Issues: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”>  The challenges in ensuring strong privacy safeguards, proper oversight of surveillance powers, and effective remedy for those arbitrarily affected continued during 2023 in Latin America. Let’s take…

The Last Mile of Encrypting the Web: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> At the start of 2023, we sunsetted the HTTPS Everywhere web extension. It encrypted browser communications with websites and made sure users benefited from the protection of…

Learn Cybersecurity Skills From Scratch for Just $30 Through January 1

Save on tech services or switch to a lucrative new tech career in 2024 by training at your own pace to develop high-demand cybersecurity skills. On sale from 12/26 through 1/1. This article has been indexed from Security | TechRepublic…

Iran-linked APT33 targets Defense Industrial Base sector with FalseFont backdoor

Microsoft reports that the Iran-linked APT33 group is targeting defense contractors worldwide with FalseFont backdoor. Microsoft says the APT33 (aka Peach Sandstorm, Holmium, Elfin, and Magic Hound) Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack against organizations in the Defense…

Vietnamese Group Hacks and Sells Bedroom Camera Footage

By Waqas Cheap Security, Costly Privacy: Vietnamese Group Profits from Hacked Home Cameras by Selling Bedroom Camera Footage- Change Your Passwords Now! This is a post from HackRead.com Read the original post: Vietnamese Group Hacks and Sells Bedroom Camera Footage…

Why a Zero Trust Security Policy Matters and Steps to Implementation

Understanding Zero Trust Traditionally, cybersecurity operated on a simple principle: trust what’s inside, be wary of what’s outside. This model assumed that once someone or something gained access to your network, they could be trusted as long as they were…

Exploitation of Numerous Zero-Days in Windows CLFS Driver by Ransomware Attackers

  Over the past 18 months, malevolent actors have taken advantage of a series of vulnerabilities, including four zero-day exploits, within a critical Windows kernel-level driver. Reports from Kaspersky’s Securelist this week not only highlight specific flaws but underscore a…

New Chameleon Android Trojan Can Bypass Biometric Security

  A brand new variant of the Chameleon Android malware has been discovered in the wild, featuring new characteristics, the most notable of which is the ability to bypass fingerprint locks. The Chameleon Android banking malware first appeared in early…

Researchers Details the Licensing Model of Predator Spyware

A recent analysis of the sophisticated commercial spyware, Predator, reveals that its ability to persist between reboots is offered as an “add-on-feature” and is dependent upon the license options selected by the user, according to a recent analysis. Predator is…

The Intersection of IoT and Financial Security: Expert Tips for Protection

Sophisticated Internet of Things (IoT) technologies transformed the cybersecurity systems in financial services. They’re continuously evolving and improving. Take credit cards as an example—commercial banks significantly cut the risk of skimming by replacing magstripe cards with chip-and-PIN cards. But despite…

Ubuntu Security Updates Fixed Vim Vulnerabilities

Vim, a powerful and widely used text editor, has recently come under scrutiny due to several vulnerabilities that could potentially compromise system security. In this article, we will delve into the intricacies of these vulnerabilities, exploring their impact and the…

Ransomware Leak Site Victims Reached Record-High in November

The number of victims listed on ransomware leak sites is up 110% year-on-year in November, according to Corvus Insurance This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Leak Site Victims Reached Record-High in November

Hunting for malicious domains with VT Intelligence

Please note that this blogpost is part of our #VTMondays series, check out our collection of past publications here. Many cyberattacks begin by victims visiting compromised websites that host malware or phishing scams, threat actors use domains for different malicious…

Merry Little Christmas

<img alt=”” height=”768″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/5c219e1a-7575-4fe9-8000-1defdc513241/image-asset.jpeg?format=1000w” width=”1024″ /> The post Merry Little Christmas appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Merry Little Christmas

Cloud Atlas’ Spear-Phishing Attacks Target Russian Agro and Research Companies

The threat actor referred to as Cloud Atlas has been linked to a set of spear-phishing attacks on Russian enterprises. Targets included a Russian agro-industrial enterprise and a state-owned research company, according to a report from F.A.C.C.T., a standalone cybersecurity company formed after Group-IB’s…

Ubisoft ransomware attack gets thwarted

Ubisoft, the France-based video game publisher, recently announced that its in-house threat monitoring software successfully thwarted a ransomware attack that occurred on December 20th of this year. Despite this security success, the company is actively investigating a potential data breach…

Safeguarding Your Data: Strategies to Protect Against Information Stealers

In today’s digital age, the security of personal and sensitive information is of utmost importance. Cyber Threats, such as information stealers, pose a significant risk to individuals and businesses alike. Information stealers are malicious software designed to surreptitiously gather and…

Digital Citizenship Lessons for Students

In the modern era, where technology and connectivity are ubiquitous, it has become essential for students to develop a deep understanding of digital citizenship. This… The post Digital Citizenship Lessons for Students appeared first on Security Zap. This article has…

Securing Student Data in Cloud Services

In today’s educational landscape, securing student data in cloud services is of utmost importance. Educational institutions are increasingly relying on cloud services to store and… The post Securing Student Data in Cloud Services appeared first on Security Zap. This article…

Security Affairs newsletter Round 451 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. LockBit…

Europol and ENISA spotted 443 e-stores compromised with digital skimming

A joint law enforcement operation led by Europol and the ENISA, along with private security firms, identified 443 online shops compromised with digital skimming. Europol, ENISA, and private security firms Group-IB and Sansec collaborated in a joint law enforcement operation,…

All I really need to know about cybersecurity, I learned in kindergarten

Here are some tried and true, hard-learned, easy-to-understand cybersecurity rules gleaned from early childhood. This article has been indexed from Security News | VentureBeat Read the original article: All I really need to know about cybersecurity, I learned in kindergarten

Corporate Spy Tech and Inequality: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Our personal data and the ways private companies harvest and monetize it plays an increasingly powerful role in modern life. Throughout 2023, corporations have continued to collect our personal data, sell…

Protecting Encryption And Privacy In The US: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF believes you have the right to have a private conversation–in the physical world, and in the digital world. The best technology to protect that right is…

USENIX Security ’23 – ‘Sneaky Spy Devices And Defective Detectors: The Ecosystem Of Intimate Partner Surveillance With Covert Devices’

Full Presenters List: Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…

The Impact of Artificial Intelligence on the Evolution of Cybercrime

  The role of artificial intelligence (AI) in the realm of cybercrime has become increasingly prominent, with cybercriminals leveraging AI tools to execute successful attacks. However, defenders in the cybersecurity field are actively combating these threats. As anticipated by cybersecurity…

Zoom Launches AI Companion, Available at No Additional Cost

  Zoom has pledged to provide artificial intelligence (AI) functions on its video-conferencing platform at no additional cost to paid clients.  The tech firm believes that including these extra features as part of its paid platform service will provide a…

Shimano’s Cyber Siege: A Saga of Resistance Against Ransomware

  Shimano Industries, a prominent Japanese multinational manufacturing company specializing in cycling components, fishing tackle, and rowing equipment, seems to have been hit by a massive data breach by the ransomware attacker LockBit, who has threatened to release confidential data, including information such…

Adobe Real-Time CDP: Personalized Customer Experience

By Owais Sultan In the current high-tech age, consumer data is a business’s most important asset as they progressively shifts towards… This is a post from HackRead.com Read the original post: Adobe Real-Time CDP: Personalized Customer Experience This article has…

Week in review: Terrapin SSH attack, Mr. Cooper breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Creating a formula for effective vulnerability prioritization In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights…

British LAPSUS$ Teen Members Sentenced for High-Profile Attacks

Two British teens part of the LAPSUS$ cyber crime and extortion gang have been sentenced for their roles in orchestrating a string of high-profile attacks against a number of companies. Arion Kurtaj, an 18-year-old from Oxford, has been sentenced to…

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk

By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security analytics are becoming essential for identifying, preventing and responding to […] The post How to Unify Multiple Analytics Systems to…