Category: EN

Major Cyber Attack Paralyzes Kyivstar – Ukraine’s Largest Telecom Operator

Ukraine’s biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting customer access to mobile and internet services. “The cyberattack on Ukraine’s #Kyivstar telecoms operator has impacted all regions of the country with high impact to the capital, metrics show,…

Microsoft Fixes 34 CVEs and One Zero-Day in December Patch Tuesday

Microsoft has released updates for dozens of vulnerabilities including one zero-day flaw This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes 34 CVEs and One Zero-Day in December Patch Tuesday

FakeSG campaign, Akira ransomware and AMOS macOS stealer

In this report, we share our latest crimeware findings: FakeSG malware distribution campaign delivering NetSupport RAT, new Conti-like Akira ransomware and AMOS stealer for macOS. This article has been indexed from Securelist Read the original article: FakeSG campaign, Akira ransomware…

Which cybersecurity controls are organizations struggling with?

How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some good and some bad results – and room for improvement. What is MVSP? Minimum Viable Secure…

Tips for Achieving Success With a NERC CIP Audit

Electrical utilities are responsible for just about everything we do. This presents a tremendous burden on those who operate those utilities. One way these organizations offer assurance is through the audit process. While audits can generate tremendous anxiety, good planning,…

Operational Resilience: What It Is and Why It’s Important

Frankly stated, operational resilience is your ability to climb the mountain, no matter the weather. Businesses now need more than a good security structure to weather the storms of AI-driven threats, APTs, cloud-based risks, and hyper-distributed environments. And more importantly,…

December 2023 Microsoft Patch Tuesday fixed 4 critical flaws

Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products, including a zero-day. Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products. The vulnerabilities addressed by the company impact Microsoft Windows…

Rhysida Ransomware Attacking Government & IT Industries Worldwide

Hackers use ransomware to encrypt victims’ files and demand payment (usually in cryptocurrency) for the decryption key.  This malicious tactic allows them to extort money from the following entities by exploiting vulnerabilities in their digital systems:- In May 2023, this…

Ensuring a Secure Future: Global Guidelines for AI Security

Artificial Intelligence (AI) is rapidly transforming industries and societies, offering unprecedented opportunities and efficiencies. However, with the increasing integration of AI into various facets of our lives, concerns about security and ethical considerations have come to the forefront. Establishing global…

Microsoft’s Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical

Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it one of the lightest releases in recent years. Of the 33 shortcomings, four are rated Critical and 29 are rated Important in…

Rhysida Ransomware targets Sony Insomniac

Sony has initiated an inquiry into a security breach affecting its game developer division, ‘Insomniac Games.’ The investigation has confirmed that the incident resulted in the unauthorized access and leakage of employee information, as well as details related to upcoming…

Think tank report labels NSO, Lazarus, as ‘cyber mercenaries’

Sure, they do crimes. But the plausible deniability governments adore means they deserve a different label Cybercrime gangs like the notorious Lazarus group and spyware vendors like Israel’s NSO should be considered cyber mercenaries – and become the subject of…

Shifting data protection regulations show why businesses must put privacy at their core

Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to focus compliance efforts will be tricky, with more and more state-level privacy laws becoming effective in the US, creating a…

A closer look at LATMA, the open-source lateral movement detection tool

In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced algorithms to track and report any unusual activity within an environment. The tool consists…

ThreatNG open-source datasets aim to improve cybersecurity practices

The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency, collaboration, and improvement of cybersecurity practices globally. Datasets for organizational insight The open-source datasets offered by ThreatNG provide an understanding…

Smart Thermostats: Savings and Comfort at Your Fingertips

The promise of energy savings and convenience stand in stark contrast to the energy-wasting, manual thermostats of the past. Smart thermostats offer a modern approach… The post Smart Thermostats: Savings and Comfort at Your Fingertips appeared first on Security Zap.…

Guide: Application security posture management deep dive

Distinguishing real, business-critical application risks is more challenging than ever. A siloed, ad hoc approach to AppSec generates noisy false positives that overwhelm under-resourced security teams. You need a multidimensional approach that leverages deep context to continuously map, programmatically prioritize,…

Industry regulations and standards are driving OT security priorities

When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty. In Claroty’s previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted…

American Intellectual Property Theft a $600 Billion Dollar Issue

American Intellectual Property (IP) theft is costing the domestic economy as much as $600 billion per year, as reported by the Associated Press, and it… The post American Intellectual Property Theft a $600 Billion Dollar Issue appeared first on Security…

Home Automation for All: Enabling Independence

As technology advances, home automation provides a sense of empowerment for elderly and disabled individuals. With the click of a button or voice command, users… The post Home Automation for All: Enabling Independence appeared first on Security Zap. This article…

How CSRD and EED are Reshaping Data Center Sustainability Reporting

With greater scrutiny of environmental impacts and a burgeoning consciousness about the social responsibility of data center operators, European regulations are undergoing significant transformations. The advent of the Corporate Sustainability Reporting Directive (CSRD) and the Energy Efficiency Directive (EED) are…

Cyberattack Cripples Ukraine’s Largest Telecom Operator

Kyivstar, the largest mobile network operator in Ukraine, was hit by a massive cyberattack on Tuesday, disrupting mobile and internet communications for millions of citizens. The post Cyberattack Cripples Ukraine’s Largest Telecom Operator appeared first on SecurityWeek. This article has…

Final Patch Tuesday of 2023 goes out with a bang

Microsoft fixed 36 flaws. Adobe addressed 212. Apple, Google, Cisco, VMware and Atlassian joined the party It’s the last Patch Tuesday of 2023, which calls for celebration – just as soon as you update Windows, Adobe, Google, Cisco, FortiGuard, SAP, VMware,…

Ukrainian military intelligence service hacked the Russian Federal Taxation Service

The Ukrainian government’s military intelligence service announced the hack of the Russian Federal Taxation Service (FNS). Hackers of the Main Intelligence Directorate of the Ministry of Defense of Ukraine announced they have compromised the Russian Federal Taxation Service (FNS). The…

Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware

By Waqas Another day, another gaming giant claimed by a ransomware group. This is a post from HackRead.com Read the original post: Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware This article has been indexed from Hackread – Latest Cybersecurity…

Bitcoin ATM company Coin Cloud got hacked. Even its new owners don’t know how.

In November, the cybersecurity collective vx-underground wrote on X, formerly Twitter, that unknown hackers were claiming to have breached Coin Cloud, a bankrupt Bitcoin ATM company. According to vx-underground, the hackers claimed to have stolen 70,000 pictures of customers taken…

How to choose a free vulnerability scanner: Insights from an industry veteran

How to choose a free vulnerability scanner? Industry expert Robert Elworthy has the answers. This article has been indexed from Malwarebytes Read the original article: How to choose a free vulnerability scanner: Insights from an industry veteran

Cyberattack Cripples Ukraine’s Largest Telcom Operator

Kyivstar, the largest mobile network operator in Ukraine, was hit by a massive cyberattack on Tuesday, disrupting mobile and internet communications for millions of citizens. The post Cyberattack Cripples Ukraine’s Largest Telcom Operator appeared first on SecurityWeek. This article has…

Does Your App Accept Digital Wallets?

Digital wallets are electronic systems that securely store payment information digitally. They make it easy to make electronic transactions online or in stores without using physical cards. Digital wallets are designed for convenience and often include security features to protect…

Update now! Apple issues patches for older iPhones and other devices

Apple has issued emergency updates that include patches for older iOS devices concerning two actively used zero-days that were patched for iOS 17 last week This article has been indexed from Malwarebytes Read the original article: Update now! Apple issues…

VERT Threat Alert: December 2023 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s December 2023 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1086 on Wednesday, December 13th. In-The-Wild & Disclosed CVEs CVE-2023-20588 AMD has released AMD-SB-7007 – Speculative Leaks…

Healthcare giant Norton breach leads to theft of millions of patient records

Ransomware operator ALPHV/Blackcat reportedly stole 2.5 million records from non-profit healthcare system Norton Healthcare This article has been indexed from Malwarebytes Read the original article: Healthcare giant Norton breach leads to theft of millions of patient records

Snyk Launches ASPM Platform to Secure Software Supply Chains

Snyk’s ASPM platform promises to bridge the divide between cybersecurity teams and application developers. The post Snyk Launches ASPM Platform to Secure Software Supply Chains appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Adobe Patches 207 Security Bugs in Mega Patch Tuesday Bundle

Adobe warned users on both Windows and macOS systems about exposure to code execution, memory leaks and denial-of-service security issues. The post Adobe Patches 207 Security Bugs in Mega Patch Tuesday Bundle appeared first on SecurityWeek. This article has been…

Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws

Microsoft warns of critical spoofing and remote code execution bugs in the Windows MSHTML Platform and Microsoft Power Platform Connector. The post Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws appeared first on SecurityWeek. This article has been…

DEF CON 31 – David Pekoske’s, Sean Lyngaas’, Jen Easterly’s ‘All Information Looks Like Noise Until You Break The Code’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling

In the ever-evolving landscape of software development, it’s become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle (SDLC). Need proof? In the last three years alone, we’ve witnessed a surge of high-profile supply chain attacks including…

Beyond Buzzwords: Glasswing AI palette guides startups navigating AI’s diverse terrain

LLMs have dominated the news, but it won’t be a defensible technology. Glasswing’s AI Palette is a new framework for startup founders about AI and ML technologies. This article has been indexed from Security News | VentureBeat Read the original…

How ConductorOne’s Copilot improves identity governance with AI

ConductorOne’s Copilot provides risk-based recommendations to guide approvers, using insights across all identity and access data. This article has been indexed from Security News | VentureBeat Read the original article: How ConductorOne’s Copilot improves identity governance with AI

December 2023 Patch Tuesday: 33 fixes to wind the year down

Microsoft’s December 2023 Patch Tuesday is a light one: 33 patches, only four of which are deemed critical. “This month, Microsoft did not patch any zero-day vulnerabilities, marking only the second time in 2023 that no zero-days were fixed (June…

Microsoft releases lightest Patch Tuesday in three years, no zero-days disclosed

The company’s regular set of advisories has included a vulnerability that’s been actively exploited in the wild in 10 months this year. This article has been indexed from Cisco Talos Blog Read the original article: Microsoft releases lightest Patch Tuesday…

Meta Publicly Releases End-To-End Encryption For Facebook Messenger

After much hype, Meta has finally rolled out end-to-end encryption for its Facebook Messenger app.… Meta Publicly Releases End-To-End Encryption For Facebook Messenger on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has…

9 Best Next-Generation Firewall (NGFW) Solutions for 2023

Compare the best next-generation firewall solutions. Find the right NGFW solution for you by evaluating features and pricing now. The post 9 Best Next-Generation Firewall (NGFW) Solutions for 2023 appeared first on eSecurity Planet. This article has been indexed from…

Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack

Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. The attack is linked to the ongoing conflict. Kyivstar, the largest Ukraine service provider was down after a major cyber attack. The Ukrainian telecommunications company provides…

CISA Unveils Tools to Strengthen Google Cloud Services

As organizations continue their migration to the cloud, threat groups are not far behind. According to a report earlier this year from cybersecurity firm CrowdStrike, the number of attacks against cloud environments in 2022 jumped 95% year-over-year, and those involved…

How the EU Cyber Resilience Act Impacts Manufacturers

EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: How the EU Cyber Resilience Act Impacts Manufacturers

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. This article has been indexed from Security | TechRepublic Read the original article: Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects…

SAP Patches Critical Vulnerability in Business Technology Platform

SAP patches multiple vulnerabilities in the Business Technology Platform, including a critical elevation of privilege bug. The post SAP Patches Critical Vulnerability in Business Technology Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Avira security software is causing Windows PCs to freeze up, and there’s no fix in sight

Over the past few days, many users have been pouring onto social media platforms and online message boards, complaining that their PC is freezing up randomly if they are running Avira as their AV software of choice. One affected user…

No Robots(.txt): How to Ask ChatGPT and Google Bard to Not Use Your Website for Training

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Both OpenAI and Google have released guidance for website owners who do not want the two companies using the content of their sites to train the company’s…

Discord in the ranks: Lone Airman behind top-secret info leak on chat platform

Poor cybersecurity hygiene in the military? Surely not! There was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their…

Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues

A new hope: Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like. The post Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Unveiling the Cyber Threats to Healthcare: Beyond the Myths

Let’s begin with a thought-provoking question: among a credit card number, a social security number, and an Electronic Health Record (EHR), which commands the highest price on a dark web forum?  Surprisingly, it’s the EHR, and the difference is stark: according…

Fake Resumes, Real Malware: TA4557 Exploits Recruiters for Backdoor Access

By Waqas TA4557 is a financially motivated threat actor known to distribute the More_Eggs backdoor against recruiters on LinkedIn. This is a post from HackRead.com Read the original post: Fake Resumes, Real Malware: TA4557 Exploits Recruiters for Backdoor Access This…

Unleashing the Power of GPT in Slack With React Integration

In the dynamic landscape of communication and collaboration, Slack has emerged as a powerful platform for teams to connect and work seamlessly. The integration of GPT (Generative Pre-trained Transformer) with Slack, powered by React, takes this collaboration to new heights.…

Hardening cellular basebands in Android

Posted by Ivan Lozano and Roger Piqueras Jover Android’s defense-in-depth strategy applies not only to the Android OS running on the Application Processor (AP) but also the firmware that runs on devices. We particularly prioritize hardening the cellular baseband given…

Over 100 WordPress Repository Plugins Affected by Shortcode-based Stored Cross-Site Scripting

On August 14, 2023, the Wordfence Threat Intelligence team began a research project to find Stored Cross-Site Scripting (XSS) via Shortcode vulnerabilities in WordPress repository plugins. This type of vulnerability enables threat actors with contributor-level permissions or higher to inject…

Bitcoin ATM company Coin Cloud got hacked. Even its new owners don’t know how

In November, the cybersecurity collective vx-underground wrote on X, formerly Twitter, that unknown hackers were claiming to have breached Coin Cloud, a bankrupt Bitcoin ATM company. According to vx-underground, the hackers claimed to have stolen 70,000 pictures of customers taken…

Apple Sets Trap to Catch iMessage Impersonators

New iMessage Contact Key Verification feature in Apple’s iOS and macOS platforms help catch impersonators on its iMessage service. The post Apple Sets Trap to Catch iMessage Impersonators appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Google Updates Chrome bfcache For Faster Page Viewing

Chrome users may now experience better page viewing when navigating through different pages. Google decided… Google Updates Chrome bfcache For Faster Page Viewing on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has…

Multi-cloud vs. hybrid cloud: The main difference

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Multi-cloud vs. hybrid cloud: The main difference

Ukraine’s largest mobile operator Kyivstar downed by ‘powerful’ cyberattack

Ukraine’s largest telecommunications operator Kyivstar says it has been hit by a “powerful” cyberattack that has disrupted phone and internet services for millions of people across the country. In a Facebook post confirming the incident on Tuesday, Kyivstar wrote that…

Secure your critical roadways infrastructure as you digitize and resolve congestion

Learn how to accelerate roadways digitization to capture new opportunities while protecting your infrastructure from cyber threats. This article has been indexed from Cisco Blogs Read the original article: Secure your critical roadways infrastructure as you digitize and resolve congestion

Dubai’s largest taxi app exposes 220K+ users

The Dubai Taxi Company (DTC) app, which provides taxi, limousine, and other transport services, left a database open to the public, exposing sensitive customer and driver data. Dubai Taxi Company, a subsidiary of Dubai’s Roads and Transport Authority, leaked a…

Insomniac Game Wolverine Hits Ransomware Attack

Insomniac Games, the developer of Spider-Man 2, was recently targeted by a ransomware attack known as Rhysida. A… The post Insomniac Game Wolverine Hits Ransomware Attack appeared first on Hackers Online Club (HOC). This article has been indexed from Hackers…

Kelvin Security cybercrime gang suspect seized by Spanish police

A malicious hacking group, thought to have been operating since at least 2013, may have suffered a significant blow after the arrest of a suspected leading member by Spanish police late last week. Spain’s National Police arrested a Venezuelan man…

CISA Releases Two Industrial Control Systems Advisories

CISA released two Industrial Control Systems (ICS) advisories on December 12, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-23-346-01 Schneider Electric Easy UPS Online Monitoring Software ICSA-22-356-03 Mitsubishi Electric MELSEC iQ-R, iQ-L…

Netskope and BT Partner to Provide Secure Managed Services to the Modern Hybrid Enterprise

Today, BT and Netskope have announced a partnership to bring Netskope’s Security Service Edge (SSE) capabilities to BT’s global customers. The partnership follows a number of large customer implementations where the two companies have already collaborated to successfully meet the…

What the SEC’s New Incident Disclosure Rules Mean for CISOs

Key takeaways for CISOs and business leaders to keep top of mind ahead of the upcoming SEC incident disclosure filing.        This article has been indexed from CISO Collective Read the original article: What the SEC’s New Incident Disclosure Rules…

Lazarus Group Exploits Log4j Flaw in New Malware Campaign

The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detection, with a new campaign featuring the exploitation of the Log4j critical vulnerability and three new malware families written in the D – or DLang –…

November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus

Researchers reported on a new AsyncRAT campaign where malicious HTML files were being used to spread the stealthy malware. Meanwhile, downloader FakeUpdates jumped straight into second place after a short break from the top ten list Our latest Global Threat…

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked APT group Lazarus is behind a new hacking campaign that exploits Log4j vulnerabilities to deploy previously undocumented remote access trojans (RATs). Cisco…

AI Tools are Quite Susceptible to Targeted Attacks

  Artificial intelligence tools are more susceptible to targeted attacks than previously anticipated, effectively forcing AI systems to make poor choices. The term “adversarial attacks” refers to the manipulation of data being fed into an AI system in order to…

AutoSpill Attack Steal Credentials from Android Password Managers

Security researchers from the International Institute of Information Technology (IIIT) in Hyderabad, India, have discovered a new vulnerability with some Android password managers in which some malicious apps may steal or capture users’ data credentials in WebView.  The threat actors…

Coffee Briefing Dec. 12- Lighthouse Labs’ new cyber upskilling program; Extended security updates for Windows 10; Canada’s AI code of conduct has new signatories; and more

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team!  Missed last week’s Coffee Briefing? We’ve got you covered. Lighthouse Labs launches new cyber upskilling program Tech…

DataDome Device Check blocks bots from the first request

DataDome announced it is taking its bot protection offerings to a whole new level by enabling a new challenge response for customers, called Device Check. This invisible challenge works behind the scenes, validating device-specific signals with proofs of work –…

Cyber Attack on Ukraine Kyivstar while China disrupts the Critical Infrastructure of the United States

China has recently initiated a series of cyber attacks targeting critical infrastructure in the United States, causing disruptions in power utilities, ports, transportation systems, communication networks, and water facilities. The White House has launched a comprehensive investigation into these cyber…

The Technology That’s Remaking OU Health into a Top-Tier Medical Center

Hear how Cisco worked with OU Health to fundamentally transform the management of critical infrastructure and administer the enterprise and clinical systems used to support healthcare professionals and patients. This article has been indexed from Cisco Blogs Read the original…

Why Biden’s EO on AI Conflates the Role of Red-Teaming

The AI executive order’s broad language, particularly the role of red-teaming, prompts doubts about its practical implementation and effectiveness. The post Why Biden’s EO on AI Conflates the Role of Red-Teaming appeared first on Security Boulevard. This article has been…

Censys unveils two new product tiers to help researchers enhance their threat hunting work

Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are part of a series of strategic initiatives to enhance the security community, including the introduction of Threat Hunting Boot Camps,…