Category: EN

Int’l Dog Breeding Org WALA Exposes 25GB of Pet Owners Data

By Waqas WALA (Worldwide Australian Labradoodle Association) is headquartered in the United States and maintains offices in Asia, Europe, and Australia. This is a post from HackRead.com Read the original post: Int’l Dog Breeding Org WALA Exposes 25GB of Pet…

Navigating API Governance: Best Practices for Product Managers

In the ever-evolving landscape of digital integration, APIs (Application Programming Interfaces) serve as the conduits that connect disparate systems, enabling seamless communication and fostering innovation. As the architects of digital experiences, product managers play a crucial role in orchestrating these…

Fancy Bear hackers still exploiting Microsoft Exchange flaw

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Fancy Bear hackers still exploiting Microsoft Exchange…

Disinformation Researcher Says She Was Fired After Pressure From Facebook

The post Disinformation Researcher Says She Was Fired After Pressure From Facebook appeared first on Facecrooks. There’s no doubt that Facebook has many problems on its plate, but one of the biggest is the spread of disinformation. However, according to…

How to Secure Your Kid’s Android Device

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> After finding risky software on an Android (Google’s mobile operating system) device marketed for kids, we wanted to put together some tips to help better secure your…

The Momentum, the Margin and the “Magic” with Cisco MSP Partners

The momentum of Cisco’s Managed Service Provider (MSP) partners is undeniable. Despite global economic uncertainty, the projected 2023 outlook for managed services indicates a worldwide growth of 12.7 percent, reaching a total value of US$472 billion. This article has been…

DEF CON 31 War Stories – Paz Hameiri’s ‘CON Trolling The Weather’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

Hershey phishes! – Crooks snarf chocolate lovers’ creds

Stealing Kit Kat maker’s data?! Give me a break There’s no sugarcoating this news: The Hershey Company has disclosed cyber crooks gobbled up 2,214 people’s financial information following a phishing campaign that netted the chocolate maker’s data.… This article has…

Vulnerability Summary for the Week of November 27, 2023

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info apache — dolphinscheduler Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler. The information exposed to unauthorized actors may include sensitive data such…

Microsoft Outlook Vulnerability Exploited by Russian Forest Blizzard Group

By Waqas Forest Blizzard (aka STRONTIUM, APT28, and Fancy Bear) is thought to have affiliations with or support from the Russian military intelligence agency. This is a post from HackRead.com Read the original post: Microsoft Outlook Vulnerability Exploited by Russian…

Randall Munroe’s XKCD ‘Typical Seating Chart’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2862/”> <img alt=”” height=”943″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/78a18e0d-88c3-4d7c-8bb1-77bb8b9e98a5/typical_seating_chart.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Typical Seating Chart’ appeared first on Security Boulevard.…

Tor University Challenge: First Semester Report Card

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> In August of 2023 EFF announced the Tor University Challenge, a campaign to get more universities around the world to operate Tor relays. The primary goal of…

23andMe confirms hackers stole ancestry data on 6.9 million users

On Friday, genetic testing company 23andMe announced that hackers accessed the personal data of 0.1% of customers, or about 14,000 individuals. The company also said that by accessing those accounts, hackers were also able to access “a significant number of…

Why a ransomware gang tattled on its victim, with Allan Liska: Lock and Code S04E24

This week on the Lock and Code podcast, we speak with Allan Liska about why a ransomware group tattled on its own victim, and what to expect next year. This article has been indexed from Malwarebytes Read the original article:…

Sophisticated Booking.com Scam Targeting Guests with Vidar Infostealer

By Deeba Ahmed Vidar infostealer is capable of stealing browsing data, including passwords, cryptocurrency wallet credentials, and other personal information. This is a post from HackRead.com Read the original post: Sophisticated Booking.com Scam Targeting Guests with Vidar Infostealer This article…

Supply-chain ransomware attack causes outages at over 60 credit unions

Over sixty credit unions across the United States have been taken offline following a ransomware attack at one of their technology providers – demonstrating once again the damage that can be caused by a supply-chain attack . There are a…

These 6 Ways Will Help in Improving Your Organization’s Security Culture

Having a robust security culture is the best way of protecting your organization from security data hacks. This blog will talk about six ways you can follow to foster a strong security culture.  The average cost to the organization of…

Multiple Vulnerabilities Found In Ray Compute Framework

Researchers found numerous severe security vulnerabilities in the Ray compute framework that allow unauthorized access.… Multiple Vulnerabilities Found In Ray Compute Framework on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been…

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. This article has been indexed from Security | TechRepublic Read the original article:…

Top Guns: Defending Corporate Clouds from Malicious Mavericks

While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise defense. The post Top Guns: Defending Corporate Clouds from Malicious Mavericks appeared first on SecurityWeek. This…

Ransomware Surge: 2023 Cyber Threats

In the constantly changing field of cybersecurity, 2023 has seen an increase in ransomware assaults, with important industries like healthcare, finance, and even mortgage services falling prey to sophisticated cyber threats. According to recent reports, a ransomware outbreak is aimed…

Hackers Use This New Malware to Backdoor Targets in Middle East, Africa and U.S

  Various entities in the Middle East, Africa, and the United States have fallen victim to an unidentified threat actor orchestrating a campaign involving the dissemination of a recently discovered backdoor named Agent Racoon. According to Chema Garcia, a researcher…

Bridging the Gap Between Cloud vs On-premise Security

  In the current landscape, the prevalence of the cloud era is undeniable, and the market is characterized by constant dynamism. Enterprises, in order to maintain relevance amid this competitive environment, are unmistakably demonstrating a keen interest in embracing cloud…

Cybercriminals Escalate Microsoft Office Attacks By 53% in 2023

The Kaspersky report also revealed an average detection of 411,000 malicious files per day This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Escalate Microsoft Office Attacks By 53% in 2023

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-42917 Apple Multiple Products WebKit Memory Corruption Vulnerability CVE-2023-42916 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability These types of vulnerabilities are frequent attack vectors for…

P2PInfect Botnet Is Now Targeting MIPS-Based IoT Devices

The operator behind the growing P2PInfect botnet is turning their focus to Internet of Things (IoT) and routers running the MIPS chip architecture, expanding their list of targets and offering more evidence that the malware is an experienced threat actor.…

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed AeroBlade, which appears to be aimed at carrying out both competitive and commercial cyberespionage. The threat actor employed spear-phishing as the means of distribution mechanism. A…

Harnessing the Power of APIs: Shaping Product Roadmaps and Elevating User Experiences through Authentication

In the dynamic landscape of digital product development, APIs (Application Programming Interfaces) have emerged as indispensable tools that not only connect systems but also play a pivotal role in shaping product roadmaps. In this exploration, we will unravel the multifaceted…

Hugging Face dodged a cyber-bullet with Lasso Security’s help

Further validating how brittle the security of generative AI models and their platforms are, Lasso Security helped Hugging Face dodge a potentially devastating attack by discovering that 1,681 API tokens were at risk of being compromised. The tokens were discovered…

Malvertising attacks rely on DanaBot Trojan to spread CACTUS Ransomware

Microsoft warns of ongoing malvertising attacks using the DanaBot malware to deploy the CACTUS ransomware. Microsoft uncovered ongoing malvertising attacks using the DanaBot Trojan (Storm-1044) to deploy the CACTUS ransomware. Microsoft the campaign to the ransomware operator Storm-0216 (Twisted Spider,…

Russian Pleads Guilty to Role in Developing TrickBot Malware

Russian national Vladimir Dunaev pleaded guilty to involvement in the development and use of the TrickBot malware that caused tens of millions of dollars in losses. The post Russian Pleads Guilty to Role in Developing TrickBot Malware appeared first on…

Dozens of Credit Unions Experiencing Disruptions Due to Ransomware Attack on Popular Tech Provider

  Owing to a ransomware attack on a popular technology provider, about 60 credit unions are experiencing disruptions.  A spokesperson for the National Credit Union Administration (NCUA), Joseph Adamoli, stated that the ransomware attack was directed towards Ongoing Operations, a…

Britain Nuclear site Sellafield experiences malware cyber attack

Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting the infiltration of malicious software dating as far back as 2015. Cybersecurity experts are actively engaged in probing the incident,…

Data Privacy and Security

Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and cloud computing. Some of the commonly used solutions, however, do…

How the Denver Broncos Intercepts Cyber Threats with Check Point

The Denver Broncos, a professional football club in the National Football League, depend on Check Point’s cyber security portfolio to protect Empower Field at Mile High, the team and staff. With a combination of Check Point CloudGuard, Quantum and Harmony,…

US Lawmakers Want to Use a Powerful Spy Tool on Immigrants and Their Families

Legislation set to be introduced in Congress this week would extend Section 702 surveillance of people applying for green cards, asylum, and some visas—subjecting loved ones to similar intrusions. This article has been indexed from Security Latest Read the original…

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report

Recorded Future calculates that North Korean state-sponsored threat actors are believed to have stolen more than $3 billion in cryptocurrency. The post North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report appeared first on SecurityWeek. This article has…

Building a Collaborative Approach to Secure the Connected World

The expanding IoT landscape demands a collaborative approach to PKI, ensuring seamless security across diverse domains. The post Building a Collaborative Approach to Secure the Connected World appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

ArmorCode raises $40M to consolidate security data in one place

ArmorCode, a cybersecurity platform that gathers vulnerability data from connected apps and software infrastructure, consolidating the data into a single location and standardizing it for analysis, has raised $40 million in a Series B round led by HighlandX with participation…

Accelerating Your Journey to the 128-bit Universe

A lot has been happening this year, and with additional enablement from Cisco’s Country Digital Acceleration Program, Cisco has been busy providing enhanced capabilities and services designed to assist Government customers to develop plans and policies and implement capabilities and…

Exposed Hugging Face API tokens offered full access to Meta’s Llama 2

With more than 1,500 tokens exposed, research highlights importance of securing supply chains in AI and ML The API tokens of tech giants Meta, Microsoft, Google, VMware, and more have been found exposed on Hugging Face, opening them up to…

Limiting Remote Access Exposure in Hybrid Work Environments

With the rise in remote and distributed work, companies find it increasingly difficult to manage their attack surface at the speed and scale necessary to prevent cyberattacks. The post Limiting Remote Access Exposure in Hybrid Work Environments appeared first on…

ArmorCode raises $40 million to help companies ship secure software

ArmorCode announced it closed a pre-emptive $40 million Series B round to advance its mission of helping companies ship secure software fast and at scale. Premier venture firm HighlandX led the round, joined by NGP Capital, along with participation from…

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

By Owais Sultan Stellar Cyber launches a field-proven university program to enable educational organizations to deliver hands-on cybersecurity training and provide soc services to underserved communities. This is a post from HackRead.com Read the original post: Stellar Cyber Bridges Cybersecurity…

Master the Art of Data Security: A Complete Guide To Securing Data at Rest on Amazon S3

As we step further into the digital age, the importance of data security becomes increasingly apparent. Our interactions, transactions, and even our identities are frequently translated into data, which is stored, transferred, and processed in the digital realm. When this…

CyberAv3ngers hit Unitronics PLCs at multiple US-based water facilities

Iran-affiliated attackers CyberAv3ngers continue to exploit vulnerable Unitronics programmable logic controllers (PLCs), US and Israeli authorities have said in a joint cybersecurity advisory. CyberAv3ngers targeting Unitronics PLCs CISA has recently confirmed that Iran-affiliated attackers took over a Unitronics Vision Series…

New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks

New research has unearthed multiple novel attacks that break Bluetooth Classic’s forward secrecy and future secrecy guarantees, resulting in adversary-in-the-middle (AitM) scenarios between two already connected peers. The issues, collectively named BLUFFS, impact Bluetooth Core Specification 4.2 through 5.4. They are…

PSA: Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: PSA: Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing…

New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: New Relic Says Hackers Accessed Internal Environment Using Stolen…

ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government

Security agencies say the Cyber Av3ngers group targeting ICS at multiple water facilities is affiliated with the Iranian government. The post ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government appeared first on SecurityWeek. This article…

Project PowerUp – Helping to keep the lights on in Ukraine in the face of electronic warfare

Project PowerUp is the story of how Cisco Talos worked with a multi-national, multi-company coalition of volunteers and experts to help “keep the lights on” in Ukraine, by injecting a measure of stability in Ukraine’s power transmission grid. This article…

Kubernetes DaemonSet: Practical Guide to Monitoring in Kubernetes

As teams moved their deployment infrastructure to containers, monitoring and logging methods changed a lot. Storing logs in containers or VMs just doesn’t make sense – they’re both way too ephemeral for that. This is where solutions like Kubernetes DaemonSet…

Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel

Highlights: · Expanded Cyber Frontline: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with a…

UAE CISOs Highlights their Rampant Gaps in Cybersecurity

A majority of security leader based in the United Arab Emirates (UAE) are convinced that their firms require improvements – in terms of how their teams, processes and technology operates – to mitigate any potential cyberattack. To provide insight into…

Cyber Security Today, Dec. 4, 2023 – A warning to water treatment utilities, a boot vulnerability could affect millions of PCs, and more.

This episode  reports on a campaign against critical infrastructure using PLCs, a vulnerability in PCs This article has been indexed from IT World Canada Read the original article: Cyber Security Today, Dec. 4, 2023 – A warning to water treatment…

EU Council and Parliament Reach Agreement on Cyber Resilience Act

The European institutions have finally resolved several contentious aspects of the Cyber Resilience Act This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Council and Parliament Reach Agreement on Cyber Resilience Act

What are ‘Credential Stuffing’ Attacks and 2-Step Verification?

In the Light of 23andMe Security Incident Following up on the recent security breach of 23andMe that impacted around 14,000 customer accounts, the security incident underscored the utilization of a cybersecurity tactic known as “credential stuffing,” where unauthorized access is…

US Officials To Visit Taiwan To ‘Explain’ China Chip Controls

Taiwan government says US officials to visit island next month to explain complex chip sanctions aimed at China, amidst rising tensions This article has been indexed from Silicon UK Read the original article: US Officials To Visit Taiwan To ‘Explain’…

New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices

Cybersecurity researchers have discovered a new variant of an emerging botnet called P2PInfect that’s capable of targeting routers and IoT devices. The latest version, per Cado Security Labs, is compiled for Microprocessor without Interlocked Pipelined Stages (MIPS) architecture, broadening its capabilities and…

Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk

As work ebbs with the typical end-of-year slowdown, now is a good time to review user roles and privileges and remove anyone who shouldn’t have access as well as trim unnecessary permissions. In addition to saving some unnecessary license fees,…

US Commerce Chief: China ‘Not Our Friend’

US commerce secretary Gina Raimondo defends latest round of tech export controls against ‘biggest threat’ as China promises to sidestep curbs This article has been indexed from Silicon UK Read the original article: US Commerce Chief: China ‘Not Our Friend’

Inside America’s School Internet Censorship Machine

A WIRED investigation into internet censorship in US schools found widespread use of filters to censor health, identity, and other crucial information. Students say it makes the web entirely unusable. This article has been indexed from Security Latest Read the…

Social media giants to testify over failing to protect kids

US senators issued subpoenas for the CEO’s of five social media giants to testify about their “failure to protect children online”. This article has been indexed from Malwarebytes Read the original article: Social media giants to testify over failing to…

Check Point Research Report: Shift in Cyber Warfare Tactics – Iranian Hacktivist Proxies Extend Activities Beyond Israel

Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with…

Tripwire Patch Priority Index for November 2023

Tripwire’s November 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority are patches for Microsoft Edge (Chromium-based) that resolve elevation of privilege, remote code execution, and spoofing vulnerabilities. Next on the patch priority…

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

The ASEAN region is seeing more cyber attacks as digitisation advances. Recorded Future CISO Jason Steer said software digital supply chains are one of the top risks being faced. This article has been indexed from Security | TechRepublic Read the…

LockBit on a Roll – ICBC Ransomware Attack Strikes at the Heart of the Global Financial Order

The LockBit ransomware attack on the Industrial & Commercial Bank of China demonstrates the weakness of global financial system to cyberattacks. The ransomware breach that crippled U.S. Treasury trading operations at an American subsidiary of Industrial & Commercial Bank of…

Kaspersky Security Bulletin 2023. Statistics

Key statistics for 2023: ransomware, trojan bankers, miners and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. This article has been indexed from Securelist Read the original article: Kaspersky Security Bulletin 2023. Statistics

Booking.com customers targeted in hotel booking scam

Scammers are hijacking hotels’ Booking.com accounts and using them as part of a hotel booking scam aimed at tricking guests into sharing their payment card information. “Customers of multiple properties received email or in-app messages from Booking.com that purported to…

New Employee Checklist and Default Access Policy

Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. This New Employee Checklist and Default Access Policy from TechRepublic Premium enables the IT and HR departments to effectively…

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in image parsing libraries embedded into the firmware. The shortcomings, collectively labeled LogoFAIL by Binarly, “can be used by…

Flying Blind: Is your Vulnerability Management program working?

Vulnerability management is a non-trivial problem for any organization that is trying to keep their environment safe.  There can be myriad tools in use, multiple processes, regulations, and numerous stakeholders all putting demands on the program.  All of these factors…

Application Security Trends & Challenges with Tanya Janca

In this episode, noteworthy guest Tanya Janca returns to discuss her recent ventures and her vision for the future of Application Security. She reflects on the significant changes she has observed since her career at Microsoft, before discussing her new…