Category: EN

Gemini: Google Launches its Most Powerful AI Software Model

Google has recently launched Gemini, its most powerful generative AI software model to date. And since the model is designed in three different sizes, Gemini may be utilized in a variety of settings, including mobile devices and data centres. Google…

Record Surge in Data Breaches Fueled by Ransomware and Vendor Exploits

  According to a recent report from Apple and a Massachusetts Institute of Technology researcher, the United States has witnessed a record-breaking surge in data breaches, fueled by increased attacks on third-party vendors and a rise in aggressive ransomware incidents. …

5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips

A set of flaws, collectively called 5Ghoul, in the firmware implementation of 5G mobile network modems from major vendors impacts Android and iOS devices. A team of researchers from the Singapore University of Technology and Design discovered a set of security…

Google and Apple Admit Government Spies On Users Via Push Notifications

Government spying through push notifications Government authorities have been snooping on smartphone users via push notifications sent out by applications, wrote a US senator in a letter to the Department of Justice on December 6.  Senator Ron Wyden of Oregon…

DDoS Attacks on Rappler Linked to Proxy Service Providers in US and Russia

By Waqas On Thursday, November 30, 2023, Rappler, the prominent online media giant based in the Philippines, fell victim to a relentless series of Distributed Denial of Service (DDoS) attacks. This is a post from HackRead.com Read the original post:…

Bluetooth Security Flaw Strikes Apple, Linux, and Android Devices

Vulnerabilities in the constantly changing technology landscape present serious risks to the safety of our online lives. A significant Bluetooth security weakness that affects Apple, Linux, and Android devices has recently come to light in the cybersecurity community, potentially putting…

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm. The attack is an end-to-end exploit for…

Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky

Microsoft spots surge in pro-Russia exploits of video platform to spread propaganda An unknown pro-Russia influence group spent time recruiting unwitting Hollywood actors to assist in smear campaigns against Ukraine and its president Volodymyr Zelensky.… This article has been indexed…

Norton Healthcare disclosed a data breach after a ransomware attack

Kentucky health system Norton Healthcare disclosed a data breach after it was a victim of a ransomware attack in May. Norton Healthcare disclosed a data breach after a ransomware attack that hit the organization on May 9, 2023. The security…

Energy-Efficient Home Automation: Saving the Planet and Your Wallet

What if you could make everyday life easier and more efficient while reducing your energy consumption? Home automation solutions offer an array of benefits, from… The post Energy-Efficient Home Automation: Saving the Planet and Your Wallet appeared first on Security…

WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack

A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in the POP chain introduced in version 6.4, which can be combined with a separate Object Injection, resulting in the execution…

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging. “While GuLoader’s core functionality hasn’t changed drastically over the past few years, these constant updates in their obfuscation techniques make…

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Cybersecurity researchers at Microsoft Threat Intelligence team recently unveiled that the Russian state-sponsored actor, Star Blizzard (aka SEABORGIUM, COLDRIVER, Callisto Group),…

N. Korea’s Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised systems. “The threat actor ultimately uses a backdoor to steal…

New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of…

DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’

DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An…

WTH is Modern SOC, Part 1

In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusion related to “modern SOC.” Some of them were public (example and example), while others private. One particular person went on a quest through several “leading” companies’…

Gemplex – 4,563,166 breached accounts

In February 2021, the Indian streaming platform Gemplex suffered a data breach that exposed 4.6M user accounts. The impacted data included device information, names, phone numbers, email addresses and bcrypt password hashes. This article has been indexed from Have I…

Web Security Expands into Secure Service Edge (SSE)

Trend has been securing web access for over a decade with forward-looking innovation and a global footprint to support our customer’s security strategy. We are committed to our customers’ journey of transforming their current security posture, aligning with Zero Trust…

Competing Section 702 surveillance bills on collision path for US House floor

End-of-year deadline looms on US surveillance Two competing bills to reauthorize America’s FISA Section 702 spying powers advanced in the House of Representatives committees this week, setting up Congress for a battle over warrantless surveillance before the law lapses in…

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code

Another rare security + squid story: The woman—who has only been identified by her surname, Wang—was having a meal with friends at a hotpot restaurant in Kunming, a city in southwest China. When everyone’s selections arrived at the table, she…

Kali vs. ParrotOS: 2 versatile Linux distros for security pros

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Kali vs. ParrotOS: 2 versatile Linux distros…

Top 12 Firewall Best Practices to Optimize Network Security

Following firewall best practices ensures your network is completely secure. Discover the best practices for optimal security now. The post Top 12 Firewall Best Practices to Optimize Network Security appeared first on eSecurity Planet. This article has been indexed from…

Meta releases open-source tools for AI safety

Meta has introduced Purple Llama, a project dedicated to creating open-source tools for developers to evaluate and boost the trustworthiness and safety of generative AI models before they are used publicly. Meta emphasized the need for collaborative efforts in ensuring…

Cisco Partners and Purpose are Greater Together

Last year, Cisco introduced Partnering for Purpose, where innovation and business goals with environmental, social, and governance (ESG) initiatives were highlighted to benefit partners and their customers. Cisco added a Partnering for Purpose Category in the sixth Annual Partner Innovation…

The House Intelligence Committee’s Surveillance ‘Reform’ Bill is a Farce

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Earlier this week, both the House Committee on the Judiciary (HJC) and the House Permanent Select Committee on Intelligence (HPSCI) marked up two very different bills (H.R.…

Facebook Approves Ads Featuring Violent Hate Speech Against Women Journalists

The post Facebook Approves Ads Featuring Violent Hate Speech Against Women Journalists appeared first on Facecrooks. Facebook is once again under fire this week for controversial ads it allows on its platform, with advocacy group Global Witness reporting that the…

Cyber Security Today, Week in Review for Friday, December 8, 2023

This episode features discussion on cyber attacks against OT networks, the discovery of exposed servers with medical images and  why outdated Microsoft Exchange servers are s This article has been indexed from IT World Canada Read the original article: Cyber…

Opal Security Scores $22M Investment for IAM Technology

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space. The post Opal Security Scores $22M Investment for IAM Technology appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Meta’s Purple Llama wants to test safety risks in AI models

Meta’s Project Llama aims to help developers filter out specific items that might cause their AI model to produce inappropriate content. This article has been indexed from Malwarebytes Read the original article: Meta’s Purple Llama wants to test safety risks…

Mine’s $30M boost will bring AI-based privacy to the enterprise

In a turbulent year for venture capital investing, Mine countered the trend with a Series B $30 million funding round led by Battery Ventures, with notable investments from PayPal Ventures and Nationwide Ventures. The shift in regulation for both consumer…

Social Engineering: The Art of Human Hacking

Learn how social engineering exploits human vulnerabilities through manipulation and deception. This guide covers different tactics cybercriminals use and key strategies to protect your organization. The post Social Engineering: The Art of Human Hacking appeared first on OffSec. This article…

Microsoft Glass Storage: A Breakthrough Technology That Can Make Ransomware Attacks Impossible

Microsoft has issued a paper for the largely-anticipated glass-based storage tech that it’s been planning to replace the traditional technology that’s best fitted into the hard drives and best SSDs out in the market today.  The academic paper (which is…

Fresh SLAM Attack Extracts Sensitive Data from AMD CPUs and Upcoming Intel Processors

  Academic researchers have unveiled a novel side-channel attack named SLAM, designed to exploit hardware enhancements meant to bolster security in forthcoming CPUs from major manufacturers like Intel, AMD, and Arm. The attack aims to retrieve the root password hash…

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of…

Ex-Uber CSO Joe Sullivan on why he ‘had to get over’ shock of data breach conviction

Before joining Uber as chief security officer in 2015, Joe Sullivan served for two years as a federal prosecutor with the United States Department of Justice, where he specialized in computer hacking and IP issues. He worked on a number…

Atlassian Releases Security Advisories for Multiple Products

Atlassian has released security updates to address vulnerabilities affecting multiple Atlassian products. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following advisories and apply…

In Other News: Fake Lockdown Mode, New Linux RAT, AI Jailbreak, Country’s DNS Hijacked

Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked. The post In Other News: Fake Lockdown Mode, New Linux RAT, AI Jailbreak, Country’s DNS Hijacked…

Seoul Police Reveals: North Korean Hackers Stole South Korean Anti-Aircraft Data

South Korea: Seoul police have charged Andariel, a North Korea-based hacker group for stealing critical defense secrets from South Korea’s defense companies. Allegedly, the laundering ransomware is redirected to North Korea. One of the 1.2 terabytes of data the hackers…

Critical Bluetooth Flaw Could Take Over Android, Apple, Linux Devices

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: Critical Bluetooth Flaw Could Take Over Android, Apple, Linux…

Five Cybersecurity Tabletop Exercise Myths Debunked

Understand what tabletop exercises are and how they can help your organization better prepare for a cyber incident.        This article has been indexed from CISO Collective Read the original article: Five Cybersecurity Tabletop Exercise Myths Debunked

Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan

TA446’s new TTPs: “Star Blizzard” FSB team called out by Five Eyes governments (again). The post Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Trojan Malware Hidden in Cracked macOS Software, Kaspersky Says

Newly discovered cracked applications being distributed by unauthorized websites are delivering Trojan-Proxy malware to macOS users who are looking for free or cheap versions of the software tools they want. The malware can be used by bad actors for a…

How Cisco Black Belt Academy Learns from Our Learners

Cisco Black Belt Academy offers the latest in technology enablement to our partners, distributors, and Cisco employees. With ever-changing industry trends and market dynamics, an in-depth understanding of end-users’ requirements is of supreme importance, and we strive to offer the…

Bypassing major EDRs using Pool Party process injection techniques

Researchers devised a novel attack vector for process injection, dubbed Pool Party, that evades EDR solutions. Researchers from cybersecurity firm SafeBreach devised a set of process injection techniques, dubbed Pool Party, that allows bypassing EDR solutions. They presented the technique…

iPhone Security Unveiled: Navigating the BlastPass Exploit

Apple’s iPhone security has come under scrutiny in the ever-changing field of cybersecurity due to recent events. The security of these recognizable devices has come under scrutiny because to a number of attacks, notably the worrisome ‘BlastPass’ zero-click zero-day exploit.…

Microsoft to offer glass based storage tech that is ransomware proof

Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers that facilitate Azure Cloud services. This innovative ceramics-based storage solution is specifically designed for archival purposes and is touted to…

Ex-Uber CSO Joe Sullivan on why he ‘had to get over’ shock data breach conviction

Before joining Uber as chief security officer in 2015, Joe Sullivan served for two years as a federal prosecutor with the United States Department of Justice, where he specialized in computer hacking and IP issues. He worked on a number…

That call center tech scammer could be a human trafficking victim

Interpol increasingly concerned as abject abuse of victims scales far beyond Asia origins Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated.… This article has been indexed…

Russian APT Used Zero-Click Outlook Exploit

Russian threat actor APT28 has been exploiting a no-interaction Outlook vulnerability in attacks against 14 countries. The post Russian APT Used Zero-Click Outlook Exploit appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

WordPress 6.4.2 Patches Remote Code Execution Vulnerability

WordPress 6.4.2 patches a flaw that could be chained with another vulnerability to execute arbitrary code. The post WordPress 6.4.2 Patches Remote Code Execution Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

ProvenRun Banks €15 Million for Secure Connected Vehicle Software

French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices. The post ProvenRun Banks €15 Million for Secure Connected Vehicle Software appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Bitcoin Core Flaw Raises Concerns Regarding Blockchain Integrity

  The renowned Bitcoin Core developer Luke Dashjr recently disclosed a serious flaw in the programme that he dubbed “Inscription,” which is part of the Bitcoin Core. The blockchain’s defence against spam may have a weakness, as this discovery has…

UK Regulator Begins Scrutiny Of Microsoft Partnership With OpenAI

CMA seeks feedback about the relationship between Microsoft and OpenAI, and whether it has antitrust implications This article has been indexed from Silicon UK Read the original article: UK Regulator Begins Scrutiny Of Microsoft Partnership With OpenAI

Fighting the Next Generation of Fraud

The introduction of generative AI has been a game changer for fraudsters, transforming ordinary schemes into highly sophisticated efforts. The post Fighting the Next Generation of Fraud appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Unlocking Data Privacy: Mine’s No-Code Approach Nets $30 Million in Funding

  An Israeli data privacy company, Mine Inc., has announced that it has completed a $30 million Series B fundraising round led by Battery Ventures, PayPal Ventures, as well as the investment arm of US insurance giant Nationwide, with the…

Bluetooth Vulnerability Enables Keystroke Injection on Android, Linux, macOS, iOS

By Waqas Another day, another Bluetooth vulnerability impacting billions of devices worldwide! This is a post from HackRead.com Read the original post: Bluetooth Vulnerability Enables Keystroke Injection on Android, Linux, macOS, iOS This article has been indexed from Hackread –…

Google DeepMind Researchers Uncover ChatGPT Vulnerabilities

  Scientists at Google DeepMind, leading a research team, have adeptly utilized a cunning approach to uncover phone numbers and email addresses via OpenAI’s ChatGPT, according to a report from 404 Media. This discovery prompts apprehensions regarding the substantial inclusion…

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised systems. “The threat actor ultimately uses a backdoor to steal…

Cracked macOS Software Laced with New Trojan Proxy Malware

By Deeba Ahmed Stop installing pirated and cracked software to ensure the protection of your devices against Proxy Trojan and other new malware threats. This is a post from HackRead.com Read the original post: Cracked macOS Software Laced with New…

US, UK Announce Charges and Sanctions Against Two Russian Hackers

The US and UK announce charges and sanctions against two hackers working with Russia’s FSB security service. The post US, UK Announce Charges and Sanctions Against Two Russian Hackers appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Identity Fraud Rises as E-Commerce, Payment Firms Targeted

Fraud incidents are on the rise, largely attributed to the surge in impersonation fraud and the accessibility of sophisticated attack methods and tools. The post Identity Fraud Rises as E-Commerce, Payment Firms Targeted appeared first on Security Boulevard. This article…

Trustmi Certify provides protection against business payment fraud

Trustmi released Trustmi Certify, a critical innovation in its new solution for bank account validation. Businesses can now benefit from Trustmi’s holistic approach to bank account validation that accurately verifies the account and provides full protection against business payment fraud.…

Apple To Move Key iPad Engineering Resources To Vietnam – Report

Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam This article has been indexed from Silicon UK Read the original article: Apple To Move Key iPad Engineering Resources To Vietnam – Report

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it challenging for security measures to identify and mitigate its presence:- That’s why PlugX malware stands out as a challenging and…

Cisco’s Commitment to Human Rights: A Tribute to the 75th Anniversary of the Universal Declaration of Human Rights

We celebrate the 75th anniversary of the Universal Declaration of Human Rights (UDHR) — its ongoing legacy, its relevance to Cisco, and how it shapes our work to Power an Inclusive Future for All. Here are a few of our…

Founder of Bitzlato exchange has pleaded for unlicensed money transmitting

Anatoly Legkodymov, the founder of the Bitzlato cryptocurrency exchange has pleaded in a money-laundering scheme. Anatoly Legkodymov (41) (aka Anatolii Legkodymov, Gandalf, and Tolik), the Russian founder of the unlicensed Bitzlato cryptocurrency exchange, has pleaded guilty in a money-laundering scheme.…

Cyber Security Today, Dec. 8, 2023 – Ransomware is increasingly impacting OT systems, and more

This episode reports on how hackers break into AWS cloud instances, fake anti-Ukraine online ads  using photos of celebrities This article has been indexed from IT World Canada Read the original article: Cyber Security Today, Dec. 8, 2023 – Ransomware…

How to Prevent DNS Attacks: DNS Security Best Practices

DNS attacks can completely disrupt an organization’s operations. Discover the best practices to ensure DNS processes stay protected. The post How to Prevent DNS Attacks: DNS Security Best Practices appeared first on eSecurity Planet. This article has been indexed from…

Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks

A Bluetooth authentication bypass allows attackers to connect to vulnerable Android, Linux, and Apple devices and inject keystrokes. The post Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks appeared first on SecurityWeek. This article has been indexed from…

New RCE vulnerability in Apache Struts 2 fixed, upgrade ASAP (CVE-2023-50164)

The Apache Struts project has released updates for the popular open-source web application framework, with fixes for a critical vulnerability that could lead to remote code execution (CVE-2023-50164). About CVE-2023-50164 CVE-2023-50164 may allow an attacker to manipulate file upload parameters…

NuHarbor Security partners with Zscaler to protect distributed workforces

NuHarbor Security has partnered with Zscaler to deliver a new level of cybersecurity capability and business value based on the proven effectiveness of the largest security cloud on the planet. Combining NuHarbor’s nationally recognized leadership and security insight with Zscaler’s…

Meta introduces default end-to-end encryption for Messenger and Facebook

Meta is introducing default end-to-end encryption (E2EE) for chats and calls across Messenger and Facebook, the company revealed on Wednesday. Rolling out E2EE for Messenger and Facebook E2EE ensures that messages content is only visible to the person sending the…

Ransomware-as-a-Service: The Growing Threat You Can’t Ignore

Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of ransomware, one trend that has gained prominence is Ransomware-as-a-Service (RaaS). This alarming development has transformed the cybercrime landscape, enabling individuals with…

Delve Risk and ThreatNG Security join forces to boost client decisions through advanced intelligence

Delve Risk and ThreatNG Security has unveiled a transformative partnership aimed at delivering intelligence solutions for security vendors. Strategic alliance for advanced intelligence The collaboration between Delve Risk and ThreatNG Security represents a strategic alliance aimed at revolutionizing intelligence solutions…

Importance of Web Application Security Testing: Exploring Vulnerabilities in Web Apps

Nearly 98% of web applications face vulnerabilities that could lead to malware infections, redirects to harmful sites, and other security risks. Protecting your data is paramount to shield your business from malicious intent. Web application security testing acts as a…

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy malware. “Attackers can use this type of malware to gain money by building a proxy server network or to perform criminal acts…

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP code on vulnerable sites. “A remote code execution vulnerability that…

Welltok Data Breach: 8.5M US Patients’ Information Exposed

In a recent cybersecurity incident, Welltok, a leading healthcare Software as a Service (SaaS) provider, reported unauthorized access to its MOVEit Transfer server, affecting the personal information of approximately 8.5 million patients in the United States. Discovered on July 26,…

Enterprises will need AI governance as large language models grow in number

Now is the time for businesses to start thinking about how they’ll create a governance framework for their generative artificial intelligence applications. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Enterprises will…

CISA Releases Five Industrial Control Systems Advisories

CISA released five Industrial Control Systems (ICS) advisories on December 7, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-23-341-01 Mitsubishi Electric FA Engineering Software Products ICSA-23-341-02 Schweitzer Engineering Laboratories SEL-411L ICSA-23-341-03 Johnson…

Schweitzer Engineering Laboratories SEL-411L

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 4.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schweitzer Engineering Laboratories Equipment: SEL-411L Vulnerability: Improper Restriction of Rendered UI Layers or Frames 2. RISK EVALUATION Successful exploitation of this vulnerability could expose authorized users…