Category: EN

New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails

SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls analyze and handle the SMTP traffic.  Threat actors can smuggle malicious payloads or evade detection by exploiting these inconsistencies. This…

Comcast says hackers stole data of close to 36 million Xfinity customers

Comcast has confirmed that hackers exploiting a critical-rated security vulnerability accessed the sensitive information of almost 36 million Xfinity customers. This vulnerability, known as “CitrixBleed,” is found in Citrix networking devices often used by big corporations and has been under…

A Dream Come True: My Journey to Africa as a Sea Turtle Conservation Volunteer

With Time2Give, a Cisco benefit of 80 volunteer hours in addition to regular paid time off, Business Operations Manager Cristina L. fulfilled her dream to travel to Africa and work with sea turtles. This article has been indexed from Cisco…

2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS

Hackers, including from Russia and China, launched cyberattacks and collected information, but it did not impact the integrity and security of the 2022 US election. The post 2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS appeared first…

Smishing Triad: Cybercriminals Impersonate UAE Federal Authority for Identity and Citizenship on the Peak of Holidays Season

Smishing Triad: Researchers warn crooks impersonating UAE Federal Authority for Identity and citizenship ahead of the Holiday Season Resecurity, Inc. (USA) has identified a new fraudulent campaign by the Smishing Triad gang in which they are impersonating the United Arab…

Iranian Hackers Using MuddyC2Go in Telecom Espionage Attacks Across Africa

The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go in its attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The Symantec Threat Hunter Team, part of Broadcom, is tracking the activity under the name…

Xfinity Customer Data Compromised in Attack Exploiting CitrixBleed Vulnerability

Comcast’s Xfinity says customer data, including credentials, were compromised in an attack exploiting the CitrixBleed vulnerability The post Xfinity Customer Data Compromised in Attack Exploiting CitrixBleed Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

Hexnode offers patch management for Windows devices

Hexnode launched Windows Patch Management (OS Update and Upgrade Management), alongside several additional features – Windows Autopilot and Hexnode Access catering to its Windows user base. Windows Patch Management: Streamlining updates and upgrades As the challenges of patch management intensified…

New Malvertising Campaign Distributing PikaBot Disguised as Popular Software

The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk. “PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for…

Governments Issue Warning After Play Ransomware Hits Hundreds of Organizations

US and Australian government agencies warn organizations of the Play ransomware group’s double-extortion tactics. The post Governments Issue Warning After Play Ransomware Hits Hundreds of Organizations  appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Mr. Cooper Data Breach Impacts 14.7 Million Individuals

Mr. Cooper has confirmed that personal and bank account information was compromised in a recent cyberattack. The post Mr. Cooper Data Breach Impacts 14.7 Million Individuals appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)

Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection’s security by truncating the extension negotiation message. The Terrapin attack Terrapin is a prefix truncation attack targeting the…

Mr. Cooper breach exposes sensitive info of over 14 million customers

Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On October 31, 2023, Mr. Cooper detected suspicious activity in certain network systems,” the company…

Cleafy improves banking security with real-time AI capabilities

In the ever-evolving landscape of banking and financial security, new malware variants poses a significant and imminent challenge. Traditionally, both the identification and classification of these threats only occurred post-attack, leaving banks and financial institutions vulnerable to substantial losses and…

Massive Data Breach at Gokumarket: Over a Million Users’ Information Exposed

  Several days before the leak, the GokuMarket team found an unprotected MongoDB instance, which was storing information about its users, namely those who bought and sold crypto on the exchange. In GokuMarket’s case, it is the details of more…

Over 14 Million Mortgage Customers Hit By Mr Cooper Breach

One of America’s biggest lenders, Mr Cooper, has revealed a breach impacted 14.7 million customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 14 Million Mortgage Customers Hit By Mr Cooper Breach

Telcos Forced To Pause Switch To Digital Landlines For Vulnerable

Telcos including BT, Virgin Media forced to pause switching vulnerable people to digital landlines after emergency call failures This article has been indexed from Silicon UK Read the original article: Telcos Forced To Pause Switch To Digital Landlines For Vulnerable

Hackers Actively Exploiting ActiveMQ Vulnerability to Install Malware

Attackers have been exploiting the Apache ActiveMQ Vulnerability (CVE-2023-46604) to steal data and install malware constantly. Using the Apache ActiveMQ remote code execution vulnerability, the Andariel threat group was found to be installing malware last month. Their primary targets are national…

The Current Challenges of Adopting Zero Trust and What You Can Do About Them

In the fast-evolving world of cybersecurity, the transition to remote work, the challenges of Zero Trust adoption, and the technology that supports it have taken center stage. Join me as we explore the insights of cybersecurity professionals and uncover the…

How Organizations Can Prevent Their Employees Falling for Cyber Scams

Cyber scams pose a significant threat to organizations of all sizes, regardless of their industry or geographic location. This article from TechRepublic Premium digs into the nature of these scams while also highlighting the measures organizations can take to shield…

Qakbot’s backbot: FBI-led takedown keeps crims at bay for just 3 months

Experts say malware strain make take years to die off completely Multiple sources are confirming the resurgence of Qakbot malware mere months after the FBI and other law enforcement agencies shuttered the Windows botnet.… This article has been indexed from…

QakBot Malware Emerges with New Tactics, Attacking Hospitality Industry

QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware. This malware can facilitate more malicious acts, such as the following, by infecting Windows systems and stealing confidential data, such as banking credentials:- Besides…

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread Malware

The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware. The security shortcoming is CVE-2020-14883 (CVSS score: 7.2), a remote code execution bug that could be exploited by authenticated attackers to…

3 Strategic Insights from Cybersecurity Leader Study

Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…

Cyber Attack news headlines trending on Google

The festive season of Christmas 2023 has unfortunately become a prime time for cyber-criminals to unleash a wave of cyber attacks, with incidents occurring globally every two hours. In a recent development, Iran’s petrol stations found themselves under siege from…

Vulnerability Summary for the Week of December 11, 2023

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info acronis — cyber_protect_home_office Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901. 2023-12-12…

The impact of prompt injection in LLM agents

Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are turned into agents that interact directly with the external world, utilizing tools to fetch…

Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint cybersecurity advisory from Australia and the U.S. “Play ransomware actors employ a double-extortion model, encrypting systems…

EMBA: Open-source security analyzer for embedded devices

The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups. It assists throughout the security evaluation procedure, extracting firmware, conducting static and dynamic analysis through emulation, and creating a web-based…

Ransomware trends and recovery strategies companies should know

Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in software or operating systems. Cybercriminals often target organizations with weak…

Most cloud transformations are stuck in the middle

The landscape of enterprise technology continues to evolve rapidly, with cloud transformation as a primary investment, according to HFS and IBM Consulting. Yet, most organizations have not yet experienced tangible business value from these efforts. Findings show that despite cloud…

Cybersecurity Career Pathways for Students

In today’s increasingly interconnected world, cybersecurity has emerged as a crucial discipline in protecting sensitive information and thwarting cyber threats. As the demand for secure… The post Cybersecurity Career Pathways for Students appeared first on Security Zap. This article has…

Encouraging Ethical Hacking Skills in Students

In today’s digital era, where cybersecurity threats continue to rise, the demand for skilled professionals capable of safeguarding sensitive information is more crucial than ever…. The post Encouraging Ethical Hacking Skills in Students appeared first on Security Zap. This article…

The ransomware attack on Westpole is disrupting digital services for Italian public administration

An alleged Lockbit 3.0 ransomware attack on the Italian cloud service provider Westpole disrupted multiple services of local and government organizations and municipalities. A cyber attack hit on December 8, 2023 the Italian cloud service provider Westpole, which is specialized…

Victory: Utah Supreme Court Upholds Right to Refuse to Tell Cops Your Passcode

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Last week, the Utah Supreme Court ruled that prosecutors violated a defendant’s Fifth Amendment privilege against self incrimination when they presented testimony about his refusal to give…

KubeCon 2023: Securing Software Delivery and Deployment

At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment. The post KubeCon 2023: Securing Software Delivery and Deployment appeared first on Security Boulevard. This article has been indexed from…

Accelerating Safe and Secure AI Adoption with ATO for AI: stackArmor Comments on OMB AI Memo

Ms. Clare Martorana, U.S. Federal Chief Information Officer, Office of the Federal Chief Information Officer, Office of Management Budget. Subject: Request for Comments on Advancing Governance, Innovation, and Risk Management for Agency Use of Artificial Intelligence Draft Memorandum Ms. Martorana,…

Hacktivists boast: We shut down Iran’s gas pumps today

Predatory Sparrow previously knocked out railways and a steel plant Hacktivists reportedly disrupted services at about 70 percent of Iran’s gas stations in a politically motivated cyberattack.… This article has been indexed from The Register – Security Read the original…

Facebook Scam Targets The Funeral Of A Popular Politician

The post Facebook Scam Targets The Funeral Of A Popular Politician appeared first on Facecrooks. Facebook scammers often capitalize on current events to attract interest. However, some scammers in Australia went a bridge too far when they created numerous fake…

VPN for Your Phone: Key to Global Email Security While Traveling

Explore how VPNs for phones secure your emails during travel. Learn features, benefits, and top recommendations for global access and local security. The post VPN for Your Phone: Key to Global Email Security While Traveling appeared first on Security Boulevard.…

Does Less Consumer Tracking Lead to Less Fraud?

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Here’s another reason to block digital surveillance: it might reduce financial fraud.  That’s the upshot of a small but promising study published as a National Bureau of…

Mr Cooper cyberattack laid bare: 14.7M people’s info stolen, costs hit $25M

Mortgage lender says no evidence of identity theft (yet) after SSNs, DoBs, addresses, more swiped Mortgage lender Mr Cooper has now admitted almost 14.7 million people’s private information, including addresses and bank account numbers, were stolen in an earlier IT…

Weekly Vulnerability Recap – December 18, 2023 – JetBrains TeamCity Exploits Continue

Learn about last week’s open-source software vulnerabilities, endangered data, and attacks from state-sponsored Russian threat groups. The post Weekly Vulnerability Recap – December 18, 2023 – JetBrains TeamCity Exploits Continue appeared first on eSecurity Planet. This article has been indexed…

Cyber-crooks slip into Vans, trample over operations

IT systems encrypted, personal data pilfered from North Face parent, we’re told A digital break-in has disrupted VF Corp’s operations and its ability to fulfill orders, according to the apparel and footwear giant.… This article has been indexed from The…

A Suspected Cyberattack Paralyzes the Majority of Gas Stations Across Iran

Nearly 70% of Iran’s nearly 33,000 gas stations went out of service on Monday following possible cyberattacks, Iranian state TV reported. The post A Suspected Cyberattack Paralyzes the Majority of Gas Stations Across Iran appeared first on SecurityWeek. This article…

Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing

Randall Munroe’s XKCD ‘Label the States’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2868/”> <img alt=”” height=”500″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/48350bb2-cd44-4569-9336-3b5b98352253/label_the_states.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Label the States’ appeared first on Security Boulevard.…

Controversial SEC Cyber Disclosure Rules Take Effect

They’ve been detailed, debated, and fretted about for months, but as of today, the Securities and Exchange Commission’s new set of rules dictating how and when public companies must disclose “material” cyberattacks go into effect. The new regulation and the…

Disruptions at 70% of Iran’s Gas Stations Blamed on Cyberattack

By Deeba Ahmed Cyberwar against critical Iranian infrastructure continues. This is a post from HackRead.com Read the original post: Disruptions at 70% of Iran’s Gas Stations Blamed on Cyberattack This article has been indexed from Hackread – Latest Cybersecurity News,…

New report claims your phone, TV, and smart speaker are spying on you. But is it real?

A sensational story ricocheted around the web last week, alleging that online advertisers are capable of listening in on your casual conversations as you talk within earshot of smart devices. Could it possibly be true? This article has been indexed…

OffSec’s 2023: A year of holistic cybersecurity education and strategic growth

Explore OffSec’s transformative 2023 journey in cybersecurity education and strategic growth, highlighted by a brand refresh, extensive content updates, the launch of Learn Enterprise and the OffSec Cyber Range, and significant enhancements to Kali Linux. The post OffSec’s 2023: A…

Discord Rolls Out Security Key Support For All Users

Discord users can now enjoy a secure experience as the service launched security key support… Discord Rolls Out Security Key Support For All Users on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…

Using Data Diodes for One-Way Information Transfer and Preventing Data Leaks

Every organization dealing with information processing eventually faces the challenge of securely storing confidential data and preventing its leakage. The importance of this issue for a company depends on the potential damage a data breach could cause. The greater the…

Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack

VF Corporation, the U.S.-based owner of apparel brands including Vans, Supreme, and The North Face, has confirmed a cyberattack has impacted the company’s ability to fulfill orders ahead of Christmas, one of the biggest retail events of the year. The…

X/Twitter Under Investigation by EU in First DSA Move

DSA VLOP Sinks In. Manipulation, deception, transparency: “We will make full use of our toolbox,” promises Europe. The post X/Twitter Under Investigation by EU in First DSA Move appeared first on Security Boulevard. This article has been indexed from Security…

Why extortion is the new ransomware threat

Cybercriminals are becoming more aggressive in their effort to maximize disruption and compel the payment of ransom demands, and now there’s a new extortion tactic in play. In early November, the notorious ALPHV ransomware gang, also known as BlackCat, attempted…

Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits

Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be chained by threat actors to achieve remote code execution on the Outlook email service sans any user interaction. “An attacker on the internet can chain…

MOVEit Vulnerability Hits Delta Dental: 7 Million Records Exposed

Unauthorized actors breached health data, including details related to dental procedures and claims This article has been indexed from www.infosecurity-magazine.com Read the original article: MOVEit Vulnerability Hits Delta Dental: 7 Million Records Exposed

3CX Asks Customers to Disable SQL Database Integrations to Stop Hack Attacks

3CX, a VoIP communications firm, has advised customers to disable SQL Database integrations due to the risks posed by a potential vulnerability. A SQL Injection vulnerability in 3CX CRM Integration has been identified as CVE-2023-49954. An attacker can manipulate an application’s database…

8220 Hacker Group Attacking Windows & Linux Web Servers

The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web servers with crypto-jacking malware. One of their recent activities involved the exploitation of Oracle WebLogic vulnerability (CVE-2017-3506) and Log4Shell (CVE-2021-44228).…

Guide to Creating a Robust Website Security Incident Response Plan

Earlier this year, the SEC proposed a new set of rules on cybersecurity governance , which would require public companies to make appropriate disclosures of cyber risks and management procedures. Although the amendments target the financial sector, it is one…

Pro-Israel Predatory Sparrow hacker group disrupted services at around 70% of Iran’s fuel stations

A group of Pro-Israel hacktivists, called Predatory Sparrow, is suspected of having carried out a cyber attack against petrol stations across Iran. A Pro-Israel hacktivist group, called Predatory Sparrow (or Gonjeshke Darande in Persian), is suspected of having carried out…

Police Get Medical Records without a Warrant

More unconstrained surveillance: Lawmakers noted the pharmacies’ policies for releasing medical records in a letter dated Tuesday to the Department of Health and Human Services (HHS) Secretary Xavier Becerra. The letter—signed by Sen. Ron Wyden (D-Ore.), Rep. Pramila Jayapal (D-Wash.),…

VF Corp Disrupted by Cyberattack, Online Operations Impacted

VF Corporation (NYSE: VFC), which owns and operates some of the biggest apparel and footwear brands, has been hit by a ransomware attack that included the theft of sensitive corporate and personal data. The post VF Corp Disrupted by Cyberattack,…

CISA Urges Manufacturers to Eliminate Default Passwords After Recent ICS Attacks

CISA is advising device makers to stop relying on customers to change default passwords following attacks targeting water sector ICS. The post CISA Urges Manufacturers to Eliminate Default Passwords After Recent ICS Attacks appeared first on SecurityWeek. This article has…

How to protect kids on Google Android devices from Cyber Threats

Children worldwide are increasingly drawn to mobile phones and tablets, largely due to captivating games and applications that not only engage them but also provide a sense of meaning from their unique perspectives. While it’s a reality that we can’t…

The Perils of AI Hallucination: Unraveling the Challenges and Implications

Artificial Intelligence (AI) has undeniably transformed various aspects of our lives, from automating mundane tasks to enhancing medical diagnostics. However, as AI systems become increasingly sophisticated, a new and concerning phenomenon has emerged – AI hallucination. This refers to instances…

Mobile Security Alert: CERT-In Flags Risks in Top Brands

The Indian Computer Emergency Response Team (CERT-In) has discovered security flaws in high-profile smartphone brands, including Samsung, Apple, and Google Pixel devices. After carefully analyzing these devices’ security features, CERT-In has identified certain possible weaknesses that can jeopardize user privacy…

Top 7 Trends Shaping SaaS Security in 2024

Over the past few years, SaaS has developed into the backbone of corporate IT. Service businesses, such as medical practices, law firms, and financial services firms, are almost entirely SaaS based. Non-service businesses, including manufacturers and retailers, have about 70%…