Category: EN

Cybersecurity Competitions for Students

In the rapidly evolving digital landscape, the importance of cybersecurity expertise cannot be overstated. As technology advances, so do the threats that seek to compromise… The post Cybersecurity Competitions for Students appeared first on Security Zap. This article has been…

SecureAcademy Reaches Major Milestone in its Mission to Train the Next Generation of Cyber Warriors

Check Point Software’s education program SecureAcademy has grown by 123% since 2020 with over 30 partners gained in the last 12 months and a total of 20,000 students qualified since its launch in 2017 As technology continues to advance and…

The 2023 Wordfence Holiday Bug Extravaganza Reaches An Exciting Conclusion!

After an incredibly successful few weeks, the Wordfence Holiday Bug Extravaganza came to a close yesterday. We’d like to sincerely thank everyone who spent time researching, finding, and submitting vulnerabilities. Your efforts have helped to make the WordPress community and…

Lapsus$ teen sentenced to indefinite detention in hospital after Nvidia, GTA cyberattacks

Arion Kurtaj will remain hospitalized until a mental health tribunal says he can leave Two British teens who were members of the Lapsus$ gang have been sentenced for their roles in a cyber-crime spree that included compromising Uber, Nvidia, and…

Unlocking CAPTCHAs: Moving Beyond Deterrence to Detection

Over the last six days alone, Arkose Labs identified and thwarted 189 million attacks for our customers alone. By tracking different classes of biometric inconsistencies, we gain insight into the evolving nature of bot attacks within specific customer traffic and…

Stupid Patent of the Month: Selfie Contests

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Patents are supposed to be an incentive to invent. Too often, they end up being a way to try to claim “ownership” of what should be basic…

Randall Munroe’s XKCD ‘Love Songs’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2870/”> <img alt=”” height=”341″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/ae18ac86-9082-4aeb-8c3d-7416a057d1b3/love_songs.png?format=1000w” width=”373″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Love Songs’ appeared first on Security Boulevard. This…

USENIX Security ’23 – Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef – ‘Framing Frames: Bypassing Wi-Fi Encryption By Manipulating Transmit Queues’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

Cisco Places Bet on AI Cloud Security with Isovalent Purchase

Network equipment giant Cisco on Thursday announced its next big cloud play with a plan to purchase open-source cloud networking and security firm Isovalent to boost its secure networking capabilities across public clouds. Cisco says its acquisition, expected to close…

Iran’s Peach Sandstorm Deploy FalseFont Backdoor in Defense Sector

By Waqas Peach Sandstorm, also recognized as HOLMIUM, has recently focused on global Defense Industrial Base (DIB) targets. This is a post from HackRead.com Read the original post: Iran’s Peach Sandstorm Deploy FalseFont Backdoor in Defense Sector This article has…

Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio

Isovalent raised about 70 million in funding from prominent investors including Microsoft’s venture fund, Google, and Andreessen Horowitz. The post Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio appeared first on SecurityWeek. This article has been indexed from…

‘ASTORS’ Champion QuSecure: Tips to Stay Safe this Holiday Season

Guest Editorial by Craig Debban, Chief Information Security Officer of QuSecure Have you ever been on a trip and realized you forgot to pack something important? It’s easy to overlook things during the hustle and bustle of traveling, especially during…

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for…

FXC AE1021/AE1021PE

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation Vendor: FXC Equipment: AE1021, AE1021PE Vulnerability: OS Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to…

CISA Releases Microsoft 365 Secure Configuration Baselines and SCuBAGear Tool

CISA has published the finalized Microsoft 365 Secure Configuration Baselines, designed to bolster the security and resilience of organizations’ Microsoft 365 (M365) cloud services. This guidance release is accompanied by the updated SCuBAGear tool that assesses organizations’ M365 cloud services…

Unraveling the Struts2 security vulnerability: A deep dive

In a recent webinar hosted by Sonatype, Chief Technology Officer (CTO) and co-founder Brian Fox and Field CTO Ilkka Turunen discussed the critical security vulnerability affecting Apache Struts2. The post Unraveling the Struts2 security vulnerability: A deep dive appeared first…

Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. This article has been indexed from Security | TechRepublic Read the original article: Google…

Three Big Porn Websites Must Verify User’s Age In EU

European Commission classifies Pornhub, XVideos and Stripchat as “very large online platforms”, subjecting them to strict DSA rules This article has been indexed from Silicon UK Read the original article: Three Big Porn Websites Must Verify User’s Age In EU

CISOs Need to Take a Holistic Approach to Risk Management

For effective risk management, CISOs need to consider the potential impact and consequences of a cyberattack across the entire organization. Learn more.        This article has been indexed from CISO Collective Read the original article: CISOs Need to Take a…

EFF Has a Guiding Star 🌠

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Do you ever look at something once and then get targeted ads? Have you ever been exposed in some company’s data breach? Have you ever heard a lawmaker push restrictions on…

EFF Urges Supreme Court to Set Standard for How Government Can and Can’t Talk to Social Media Sites About Censoring Users’ Posts

First Amendment Bars Coercive Censorship Demands But Some Communications Are Permissible < div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> WASHINGTON, DC—The Supreme Court should clarify standards for determining if the government permissibly advised or convinced…

Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication

Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to include users in the U.K. and Italy. “Representing a restructured and enhanced iteration of its predecessor, this evolved Chameleon variant…

Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware

A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an “add-on feature” and that it depends on the licensing options opted by a customer. “In 2021, Predator…

Weather Wonders: A Guide to Crafting a Dynamic App Using Weather APIs

By Owais Sultan Weather applications have become an integral part of our daily lives. These apps, which provide us with real-time… This is a post from HackRead.com Read the original post: Weather Wonders: A Guide to Crafting a Dynamic App…

Introducing ThreatCloud Graph: A Multi-Dimensional Perspective on Cyber Security

In the face of complex and sophisticated cyber threats, enterprises struggle to stay ahead. Addressing this core challenge, Check Point introduces ThreatCloud Graph, focused on proactive prevention of emerging threats. This groundbreaking feature within ThreatCloud AI, the brain behind all…

Recapping Cisco industrial IoT’s journey: A year of security, simplification and innovation

Discover key themes that shaped the industrial IoT journey in 2023. From enhancing cyber security to simplifying IT for operations, we’re driving digital transformation in industries. This article has been indexed from Cisco Blogs Read the original article: Recapping Cisco…

Bandook – A Persistent Threat That Keeps Evolving

FortiGuard Labs has uncovered a fresh threat – the latest generation of Bandook is being distributed via a Spanish PDF file. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Bandook –…

EFF Has a Guiding Star 🌠

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Do you ever look at something once and then get targeted ads? Have you ever been exposed in some company’s data breach? Have you ever heard a lawmaker push restrictions on…

USENIX Security ’23 – Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, and Ruiying Du – Formal Analysis And Patching Of BLE-SC Pairing

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection

  A recent phishing scheme has emerged, posing as a ‘copyright infringement’ email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication safeguarding users’ accounts.…

Healthcare Provider ESO Hit in Ransomware Attack, 2.7 Million Impacted

The breach, which unfolded on September 28, compelled ESO to shut down systems temporarily This article has been indexed from www.infosecurity-magazine.com Read the original article: Healthcare Provider ESO Hit in Ransomware Attack, 2.7 Million Impacted

CISA Releases Two Industrial Control Systems Advisories

CISA released two Industrial Control Systems (ICS) advisories on December 21, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-23-355-01 FXC AE1021/AE1021PE ICSA-23-355-02 QNAP VioStor NVR CISA encourages users and administrators to review…

QNAP VioStor NVR

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation Vendor: QNAP Equipment: VioStor NVR Vulnerability: OS Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to…

Cisco to acquire cloud-native networking and security startup Isovalent

Cisco announced this morning that it intends to acquire Isovalent, a cloud-native security and networking startup that should fit well with the company’s core networking and security strategy. The companies did not share the purchase price. Isovalent has helped develop…

The Great Interoperability Convergence: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s easy to feel hopeless about the collapse of the tech sector into a group 0f monopolistic silos that harvest and exploit our data, hold our communities…

EFF Has a Guiding Star 🌠

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Do you ever look at something once and then get targeted ads? Have you ever been exposed in some company’s data breach? Have you ever heard a lawmaker push restrictions on…

Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware

Talos revealed that rebooting an iOS or Android device may not remove the Predator spyware produced by Intellexa. Intellexa knows if their customers intend to perform surveillance operations on foreign soil. This article has been indexed from Cisco Talos Blog…

Malware threat on rise and some details

Hackers are currently exploiting an old vulnerability in Microsoft Excel to inject a newly identified malware known as ‘Agent Tesla.’ This malicious software is capable of either cleaning up a database or discreetly gathering intelligence, depending on the commands it…

Best practices for secure network automation workflows

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Best practices for secure network automation workflows

ESET fixed a high-severity bug in the Secure Traffic Scanning Feature of several products

ESET fixes a high-severity flaw in Secure Traffic Scanning Feature that could have been exploited to cause web browsers to trust sites that should not be trusted. ESET has addressed a vulnerability (CVE-2023-5594, CVSS score 7.5) in the Secure Traffic…

The Four Layers of Antivirus Security: A Comprehensive Overview

The antivirus software stands as a critical defense line against cyber-attacks. To fully understand how it operates, it’s vital to understand the four distinct layers of antivirus security. Each layer contributes to the detection and neutralization of threats, ensuring a…

2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> At the end of every year, we look back at the last 12 months and evaluate what has changed for the better (and worse) for digital rights. …

HackersEra Launches Telecom Penetration Testing to Eliminate Cyber Threats

  Cybercriminals have attacked telecom infrastructure, particularly as it shifts to an IP-based design with the introduction of Long-Term Evolution (LTE) networks, also referred to as LTE or 4G. Persistent attackers could spy on users’ cellular networks and record data…

Digital Landline Switch Halted for Vulnerable Users in UK

UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…

Wordfence Intelligence Weekly WordPress Vulnerability Report (December 11, 2023 to December 17, 2023)

🎉Wordfence just launched its bug bounty program. For the first 6 months, all awarded bounties receive a 10% bonus. View the announcement to learn more now! Last week, there were 16 vulnerabilities disclosed in 16 WordPress Plugins and no WordPress…

3 Key Updates Introduced in the 2023 FDA Cybersecurity Guidance for Medical Devices

September 25, 2023, marked the issuance of the US FDA’s guidance update for cybersecurity in… 3 Key Updates Introduced in the 2023 FDA Cybersecurity Guidance for Medical Devices on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration…

Board preparedness: 7 steps to combat cybersecurity threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Board preparedness: 7 steps to combat cybersecurity…

Celebrities Found in Unprotected Real Estate Database Exposing 1.5 Billion Records

Real Estate Wealth Network database containing real estate ownership data, including for celebrities and politicians, was found unprotected. The post Celebrities Found in Unprotected Real Estate Database Exposing 1.5 Billion Records appeared first on SecurityWeek. This article has been indexed…

Phosphorus gets $27M to build out its xIoT security solutions

Phosphorus stands out in the cybersecurity landscape with its unique capability to provide complete discovery, remediation, and security management across a vast spectrum of devices on the xIoT. This article has been indexed from Security News | VentureBeat Read the…

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

ASIC research shows 44% of Australian organisations are not managing third-party supply chain risk. Tesserent says it remains a key risk, and disruption could emerge from geopolitical tensions. This article has been indexed from Security | TechRepublic Read the original…

Phishing attacks use an old Microsoft Office flaw to spread Agent Tesla malware

Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882, to spread the Agent Tesla malware. Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882 (CVSS score: 7.8), as part of phishing campaigns to spread…

International Investigations Target Financial Cybercrime

International authorities took two big swipes at cybercriminals this week, with Interpol and others rounding up almost 3,500 suspects in a 34-country operation to crack down on cyber-scams one day while German police the next day said they shut down…

Four in five Apache Struts 2 downloads are for versions featuring critical flaw

Seriously, people – please check the stuff you fetch more carefully Security vendor Sonatype believes developers are failing to address the critical remote code execution (RCE) vulnerability in the Apache Struts 2 framework, based on recent downloads of the code.……

Defining the Future of Multicloud Networking and Security: Cisco Announces Intent to Acquire Isovalent

Cisco announces intent to acquire Isovalent, Inc. Together, Cisco and Isovalent are excited to drive the next generation of cloud networking and security innovation based on open source technology. This article has been indexed from Cisco Blogs Read the original…

Something Nasty Injected Login Stealing JavaScript Code Into 50k Online Banking Sessions

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Something Nasty Injected Login Stealing JavaScript Code Into 50k…

ESET Patches High-Severity Vulnerability in Secure Traffic Scanning Feature

ESET has patched CVE-2023-5594, a high-severity vulnerability that can cause a browser to trust websites that should not be trusted. The post ESET Patches High-Severity Vulnerability in Secure Traffic Scanning Feature appeared first on SecurityWeek. This article has been indexed…

Best of 2023: Why is everyone getting hacked on Facebook?

If your social media networks are anything like mine, you’ve noticed an uptick in people getting “hacked” lately. Maybe you’ve gotten a weird Facebook message from someone you hadn’t spoken with in a while. Maybe your least tech-y friend is…

8220 Gang Targets Telecom and Healthcare in Global Cryptojacking Attack

By Deeba Ahmed The 8220 gang, believed to be of Chinese origins, was first identified in 2017 by Cisco Talos when they targeted Drupal, Hadoop YARN, and Apache Struts2 applications for propagating cryptojacking malware. This is a post from HackRead.com…

The Elusive Quest for DevSecOps Collaboration

Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…

AWS re:Invent 2023: Cybersecurity Visibility

Shira Rubinoff talks with CySight’s Rafi Sabel at AWS re:Invent 2023. The post AWS re:Invent 2023: Cybersecurity Visibility appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: AWS re:Invent 2023: Cybersecurity Visibility

AWS re:Invent 2023: Ransomware Defense

Shira Rubinoff talks with Naj Husain from Elastio at AWS re:Invent. The post AWS re:Invent 2023: Ransomware Defense appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: AWS re:Invent 2023: Ransomware Defense

New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide

A new piece of JavaScript malware has been observed attempting to steal users’ online banking account credentials as part of a campaign that has targeted more than 40 financial institutions across the world. The activity cluster, which employs JavaScript web…

Start a career in IT with this cybersecurity training bundle

Get 114 hours of ethical hacking, penetration testing, and more with this cybersecurity course bundle. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Start a career in IT with this cybersecurity training…

Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists

The Solntsepek group has taken credit for the attack. They’re linked to the Russian military, so it’s unclear whether the attack was government directed or freelance. This is one of the most significant cyberattacks since Russia invaded in February 2022.…

FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications

The FTC has proposed strengthening children’s online privacy rules to address tracking and push notifications. The post FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Ivanti Patches Dozen Critical Vulnerabilities in Avalanche MDM Product

Ivanti has patched 20 vulnerabilities in its Avalanche MDM product, including a dozen remote code execution flaws rated critical. The post Ivanti Patches Dozen Critical Vulnerabilities in Avalanche MDM Product appeared first on SecurityWeek. This article has been indexed from…

ESO Solutions Data Breach Impacts 2.7 Million Individuals

ESO Solutions is informing 2.7 million individuals of a data breach impacting their personal and health information. The post ESO Solutions Data Breach Impacts 2.7 Million Individuals appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

Mozilla decides Trusted Types is a worthy security feature

DOM-XSS attacks have become scarce on Google websites since TT debuted Mozilla last week revised its position on a web security technology called Trusted Types, which it has decided to implement in its Firefox browser.… This article has been indexed…

Vulnerability prioritization in Kubernetes: unpacking the complexity

In the rapidly evolving world of container orchestration, developers have come to rely on Kubernetes to manage containerized The post Vulnerability prioritization in Kubernetes: unpacking the complexity appeared first on ARMO. The post Vulnerability prioritization in Kubernetes: unpacking the complexity…

New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications

Threat actors engage in cyberespionage to gain the following advantages:- Hackers do so by stealing the following key things from the targeted organizations or nations:- Cybersecurity researchers at ESET recently identified that new OilRig downloaders are abusing Microsoft Cloud APIs…

Google Rushes to Patch Eighth Chrome Zero-Day This Year

Google warns of in-the-wild exploitation of CVE-2023-7024, a new Chrome vulnerability, the eighth documented this year. The post Google Rushes to Patch Eighth Chrome Zero-Day This Year appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

Product showcase: DCAP solution FileAuditor for data classification and access rights audit

The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security (IS) specialists would not be able to cope with the protection of data in various silos due to the increase…

HCL Investigating Ransomware Attack on Isolated Cloud Environment

In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters.  The revelation of a targeted ransomware incident within an isolated cloud environment created industry ripples, yet the company’s adept response and ongoing…

German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation

German law enforcement has announced the disruption of a dark web platform called Kingdom Market that specialized in the sales of narcotics and malware to “tens of thousands of users.” The exercise, which involved collaboration from authorities from the U.S., Switzerland, Moldova, and…