Category: EN

Unveiling LockBit: Cybercrime Gang Targeting Global Titans in Hacking Spree

  Ransomware, a form of malicious software, has a history spanning over three decades. However, it only gained regular attention in popular media over the last ten years. This type of malware locks access to computer systems or encrypts files…

Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine

Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB. Check Point researchers observed Russia-linked Gamaredon spreading the worm called LitterDrifter via USB in attacks against Ukraine. Gamaredon (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) has been active since 2014 and its activity…

Researcher Claims: Teens with “Digital Bazookas” are Winning Ransomware War

One thing that Boeing, the Australian shipping company, the world’s largest bank and the world’s biggest law firm share in common is that they have all suffered a cybersecurity incident, at least once. And, these breaches have apparently been conducted…

Sam Altman Hits Pause on ChatGPT Plus Sign-Ups Amid Overwhelming Demand

  According to OpenAI’s Chief Executive Officer Sam Altman, the company has temporarily reduced the number of new subscribers for its ChatGPT Plus service due to overwhelming demand and would like to thank those who attended the event. It has…

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause This article has been indexed from WeLiveSecurity Read the…

Healthcare startups scramble to assess fallout after Postmeds data breach hits millions of patients

More than two million people across the United States will receive notice that their personal and sensitive health information was stolen earlier this year during a cyberattack at Postmeds, the parent company of online pharmacy startup Truepill. For some of…

Top 10 Cutting-Edge Technologies Set to Revolutionize Cybersecurity

  In the present digital landscape, safeguarding against cyber threats and cybercrimes is a paramount concern due to their increasing sophistication. The advent of new technologies introduces both advantages and disadvantages.  While these technologies can be harnessed for committing cybercrimes,…

ChatGPT-Maker OpenAI Fires CEO Sam Altman, the Face of the AI Boom, for Lack of Candor With Company

Open AI pushed out its co-founder and CEO Sam Altman after a review found he was “not consistently candid in his communications” with the board of directors. The post ChatGPT-Maker OpenAI Fires CEO Sam Altman, the Face of the AI…

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals. “Most of the group’s…

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon’s (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded…

Kubernetes Security on AWS: A Practical Guide

Kubernetes security is safeguarding your Kubernetes clusters, the applications they host, and the infrastructure they rely on from threats. As a container orchestration platform, Kubernetes is incredibly powerful but presents a broad attack surface for potential adversaries. Kubernetes security encompasses…

Tech Trends 2023: Staying Ahead of the Curve

Recent technological advances have been nothing short of explosive. From Artificial Intelligence to Autonomous Vehicles, current trends in technology are revolutionizing the way people interact… The post Tech Trends 2023: Staying Ahead of the Curve appeared first on Security Zap.…

DEF CON 31 XRVillage – Brittan Heller’s ‘Fireside Chat’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading operating system in the smartphone industry with more than 71% […] The post How Google Play Store Security May Fail…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser

By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue, but there’s little consensus about what to do about it. […] The post Rethinking SASE: Why Migrate Cybersecurity from Cloud…

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics. This article has been indexed from Dark Reading Read the original article: Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

On His 42nd Birthday, Alaa Abd El Fattah’s Family Files UN Petition for His Release

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Today is the birthday of Alaa Abd El Fattah, a prominent Egyptian-British coder, blogger, activist, and one of the most high-profile political prisoners in the entire Arab world.…

The FTC updated the Safeguards Rule. Here’s how to avoid notification events.

In response to continuing data breaches at entities with lesser regulatory oversight, the FTC has revised its Safeguards Rule for the second time in many years. This new revision will take effect 180 days after publication in the Federal Register…

CompTIA Advises Retailers to Check their Cybersecurity Preparedness Ahead of the Holiday Shopping Season

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CompTIA Advises Retailers to Check their Cybersecurity Preparedness Ahead of the…

VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System

CVE-2023-4966 vulnerability becomes a global problem

Threat researcher Kevin Beaumont has been tracking attacks against various companies, including the Industrial and Commercial Bank of China (ICBC), DP World, Allen & Overy, and Boeing, and found they had something […] Thank you for being a Ghacks reader.…

Evolving beyond your core expertise: it’s time to add security

This post is for creators of digital services like optimization tools,  VPN solutions, Backup and Disaster Recovery tools, Parental control tools, Identity protection tools, Privacy tools, Email clients, Browsers and many others. Your products are doing a good job in…

Cyber Security Today, Week in Review for the week ending Friday, Nov. 17, 2023

This episode features discussion on the failure to patch firewalls that led to a huge cyber attack on critical infrastructure in Denmark This article has been indexed from IT World Canada Read the original article: Cyber Security Today, Week in…

Medusa ransomware gang claims the hack of Toyota Financial Services

Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. Toyota Financial Services confirmed the discovery of unauthorized activity on systems in a limited number of its locations. “Toyota Financial Services…

Top Ten Tips for CISOs and CFOs to Strengthen their Relationships

In today’s business climate CFOs must understand and communicate how cyber risk translates to dollars and cents. This challenge arises during discussions about cybersecurity budgets, leading to potential confusion. And Read More The post Top Ten Tips for CISOs and…

How to Handle Secrets in Helm

Kubernetes (K8s), an open-source container orchestration system, has become the de-facto standard for running containerized workloads thanks to its scalability and resilience. Although K8s has the capabilities to streamline deployment processes, the actual deployment of applications can be cumbersome, since…

SBOM formats compared: CycloneDX vs. SPDX vs. SWID Tags

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: SBOM formats compared: CycloneDX vs. SPDX vs.…

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others. This article has been indexed from Dark Reading…

5 Best Practices for Secure Payment Processing in Applications

Secure payment processing is vital for ensuring customers can shop safely on your app. Cyberattacks become more frequent each year, with a particular emphasis on stealing financial information. Luckily, you can implement a few best practices to simplify security and…

Piloting New Ground: Expanding Scalable Cybersecurity Services to Protect the Broader Critical Infrastructure Community

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Piloting New Ground: Expanding Scalable Cybersecurity Services to Protect the Broader…

Google Reveals ‘Reptar’ Vulnerability Threatening Intel Processors

By Deeba Ahmed Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments. This is a post from HackRead.com Read the original post: Google Reveals ‘Reptar’ Vulnerability Threatening Intel Processors This article has been indexed from Hackread – Latest Cybersecurity News, Press Releases…

SASE Converge ‘23 Showcases the Potential and Impact of AI-Powered SASE

Today at SASE Converge ‘23, we’re showcasing innovations helping shape the future of SASE and network security. The post SASE Converge ‘23 Showcases the Potential and Impact of AI-Powered SASE appeared first on Palo Alto Networks Blog. This article has…

LockBit redraws negotiation tactics after affiliates fail to squeeze victims

Cybercrime group worried over dwindling payments … didn’t they tell them to Always Be Closing? In response to growing frustrations inside the LockBit organization, its leaders have overhauled the way they negotiate with ransomware victims going forward.… This article has…

The Bin Laden Letter Is Being Weaponized by the Far Right

Far-right influencers and right-wing lawmakers are using the spread of Osama bin Laden’s “Letter to America” to call for a TikTok ban and boost decades old conspiracies. This article has been indexed from Security Latest Read the original article: The…

Microsoft plugs Copilot in everywhere at Ignite 2023

This week at Ignite, Microsoft brandished its Copilot Swiss Army knife, embedding the AI assistant into all of its products and services. The company’s chief executive officer, Satya Nadella, said, “Microsoft has over 1 million paid Copilot users in more…

Actions to Take to Defeat Initial Access Brokers

Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials. This article has been indexed from Dark Reading Read the original article: Actions to Take to Defeat…

2 Environmentalists Who Were Targeted by a Hacking Network Say the Public Is the Real Victim

Two environmentalists told a judge that the public was the real victim of a global computer hacking campaign that targeted those fighting big oil companies to get the truth out about global warming. The post 2 Environmentalists Who Were Targeted…

OpenSSL 3.2 Final Release Postponed

As part of the OpenSSL project’s commitment to deliver a secure and high quality cryptography toolkit, we routinely apply fuzzing to the OpenSSL codebase, which searches automatically for potential bugs in upcoming OpenSSL releases. This fuzzing process runs continuously and…

How Do Password Managers Work and Why Do You Need One?

Learn how password managers work, their benefits, and why your organization needs one to secure sensitive data and prevent security breaches. This article has been indexed from Security | TechRepublic Read the original article: How Do Password Managers Work and…

Assigning User Privileges in Heimdal [It’s Easy]

Managing user privileges is a critical task for any organization. This article aims to guide you through the process of assigning user privileges in Heimdal, ensuring a secure and efficient management of your cybersecurity infrastructure.  Key Takeaway Summary  Understanding User…

OT Risk Management: Proactive OT Threat Detection and Malware Prevention

Understand how OT risk management and OT threat detection are key components to implement in your cyber defense.        This article has been indexed from Fortinet Industry Trends Blog Read the original article: OT Risk Management: Proactive OT Threat Detection…

FCC Tightens Telco Rules to Combat SIM-Swapping

Under the new rules, wireless carriers are required to notify customers of any SIM transfer requests, a measure designed to thwart fraudulent attempts by cybercriminals. The post FCC Tightens Telco Rules to Combat SIM-Swapping appeared first on SecurityWeek. This article…

In Other News: Major Law Firm Hacked, Chinese Bank Pays Ransom, PyPI Security Audit

Noteworthy stories that might have slipped under the radar: top law firm hacked, Chinese bank pays ransom, and PyPI conducts first security audit. The post In Other News: Major Law Firm Hacked, Chinese Bank Pays Ransom, PyPI Security Audit appeared…

US Teen Pleads Guilty to Credential Stuffing Attack on Fantasy Sports Website

Wisconsin teenager Joseph Garrison has admitted in court to launching a credential stuffing attack on a betting website. The post US Teen Pleads Guilty to Credential Stuffing Attack on Fantasy Sports Website appeared first on SecurityWeek. This article has been…

IBM Pulls Advertising From X/Twitter, Amid Nazi Content Row

Another big name suspends advertising on X (aka Twitter), after its ads appeared next to posts praising Adolf Hitler and Nazis This article has been indexed from Silicon UK Read the original article: IBM Pulls Advertising From X/Twitter, Amid Nazi…

The Bin Laden Letter Is Being Weaponized by the Far-Right

Far-right influencers and right-wing lawmakers are using the spread of Osama bin Laden’s “Letter to America” to call for a TikTok ban and boost decades old conspiracies. This article has been indexed from Security Latest Read the original article: The…

Beyond the climate jargon: Reflections from climate conference season 2023

Jocelyn Matyas, who manages the Cisco Foundation’s Climate Impact and Regeneration Investing Portfolio, shares lessons from climate conference season. This article has been indexed from Cisco Blogs Read the original article: Beyond the climate jargon: Reflections from climate conference season…

Celebrating ThousandEyes’ Partner of the Year: World Wide Technology (WWT)

Partnerships are the bedrock upon which Cisco innovates and succeeds. In this spirit, Cisco ThousandEyes is thrilled to announce World Wide Technology (WWT) as the winner of the inaugural ThousandEyes Partner of the Year Award. This article has been indexed…

Google to Force-Block Ad Blockers — Time to Get Firefox?

Manifest V3: Destiny. Huge advertising monopoly flexes muscles: “Manifest V2” extensions to be nuked, but “V3” cripples ad blockers. The post Google to Force-Block Ad Blockers — Time to Get Firefox? appeared first on Security Boulevard. This article has been…

New ChatGPT Update Unveils Alarming Security Vulnerabilities – Is Your Data at Risk?

  The recent enhancements to ChatGPT, such as the introduction of the Code Interpreter, have brought about heightened security issues, as per the investigations conducted by security expert Johann Rehberger and subsequently validated by Tom’s Hardware. Notably, the vulnerabilities in…

Securing Open Source: A Comprehensive Guide

Open-source software has become the backbone of many modern applications, providing cost-effective solutions and fostering collaborative development. However, the open nature of these projects can sometimes raise security concerns. Balancing the benefits of open source with the need for robust…

Unveiling the power of the new Query Builder in Sekoia SOC Platform

Introduction The Query Builder is designed to simplify data exploration and enhance threat detection capabilities. This feature empowers Security Operations Center (SOC) teams to explore their data through an intuitive interface, enabling structured queries and insightful data aggregation for threat…

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements. This article has been indexed from Dark Reading Read the original article: Hands Off the Security Budget! Find Efficiencies…

SonicWall swallows Solutions Granted amid cybersecurity demand surge

CEO Bob VanKirk makes near-20-year partnership official, teases big things coming to EMEA Channel-focused cybersecurity company SonicWall is buying Virginia-based MSSP Solutions Granted – its first acquisition in well over a decade.… This article has been indexed from The Register…

Automation in Healthcare Data Privacy and Compliance

In the healthcare sector where data privacy and compliance are paramount, automation manifests as a formidable defense tool. The post Automation in Healthcare Data Privacy and Compliance appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Application Security in Technical Product Management

In recent years, the number of cyberattacks has been steadily increasing, and applications have become increasingly targeted. According to a report by Verizon, web applications were the most common target of data breaches in 2022, accounting for over 40% of…

Key GOP Lawmaker Calls for Renewal of Surveillance Tool as He Proposes Changes to Protect Privacy

The Republican chairman of the House Intelligence Committee has called for the renewal of a key US government surveillance tool as he proposed a series of changes aimed at safeguarding privacy. The post Key GOP Lawmaker Calls for Renewal of…

Over a Dozen Exploitable Vulnerabilities Found in AI/ML Tools

Bug hunters uncover over a dozen exploitable vulnerabilities in tools used to build chatbots and other types of AI/ML models. The post Over a Dozen Exploitable Vulnerabilities Found in AI/ML Tools appeared first on SecurityWeek. This article has been indexed…

Improve User Experience with Parallel Execution of HTTP/2 Multiplexed Requests

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Improve User Experience with Parallel Execution of HTTP/2 Multiplexed Requests

CISA Releases The Mitigation Guide: Healthcare and Public Health (HPH) Sector

Today, CISA released the Mitigation Guide: Healthcare and Public Health (HPH) Sector as a supplemental companion to the HPH Cyber Risk Summary, published July 19, 2023. This guide provides defensive mitigation strategy recommendations and best practices to combat pervasive cyber…

Juniper Releases Security Advisory for Juniper Secure Analytics

Juniper released a security advisory to address multiple vulnerabilities affecting Juniper Secure Analytics. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the Juniper advisory…

Mitigating Cybersecurity Risks in a Hybrid-Work World

This shift toward remote work has opened up new opportunities for cybercriminals to exploit vulnerabilities and compromise sensitive data. The post Mitigating Cybersecurity Risks in a Hybrid-Work World appeared first on Security Boulevard. This article has been indexed from Security…

FBI and CISA Reveals: ‘Royal’ Ransomware Group Targeted 350 Victims for $275 Million

In a joint advisory, the FBI and CISA have revealed a network breach conducted by the ‘Royal ransomware gang’ that has targeted nearly 350 organizations globally since 2022.  Giving further details of the original advisory published in March, in the…

Over Fifty Percent Businesses Feel Security Element is Missing in Their Data Policy

  These days, the average business generates an unprecedented amount of data, and this amount is only expected to increase.  According to a new report from Rubrik Zero Labs, this makes data security – an absolute must for any successful…

New ThreatCloud AI engine designed to prevent IPFS attacks

In the ever-evolving landscape of cyber threats, the rise of decentralized technologies, particularly the Interplanetary File System (IPFS), has ushered in both challenges and opportunities for attackers. In this blog post, we embark on a journey into the realm of…

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024. This article has been indexed from Dark Reading Read the original article: IT Pros Worry Generative AI Will Be a Major Driver of…

The Challenges of Adopting ISO 27001 Controls: A Comprehensive Guide for CISOs and IT Administrators

When it comes to information security, ISO 27001 is of paramount importance. As CISOs and IT administrators, you’re likely familiar with its significance. However, the journey from understanding to effectively implementing ISO 27001 controls is not without challenges.   This article…

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the name SEO#LURKER. “The…

FortiSIEM Injection Flaw: Let Attackers Execute Malicious Commands

Fortinet notifies users of a critical OS command injection vulnerability in the FortiSIEM report server that might enable an unauthenticated, remote attacker to execute malicious commands via crafted API requests. FortiSIEM is Fortinet’s security information and event management (SIEM) solution,…

Decrypting Danger: Check Point Research deep-dive into cyber espionage tactics by Russian-origin attackers targeting Ukrainian entities

Highlights: Gamaredon, a distinct APT player in Russian espionage, stands out for its large-scale campaigns primarily targeting Ukrainian entities. The USB worm, LitterDrifter, reveals a global impact with potential infections in countries like the USA, Vietnam, Chile, Poland, Germany, and…

CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability

CISA adds Sophos, Oracle and Microsoft product security holes to its Known Exploited Vulnerabilities (KEV) catalog. The post CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

Google’s Chatbot Bard Aims for the Top, Targeting YouTube and Search Domains

  There has been a lot of excitement surrounding Google’s AI chatbot Bard – a competitor to OpenAI’s ChatGPT, which is set to become “more widely available to the public in the coming weeks.” However, at least one expert has…