Category: EN

QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices

QNAP has released security updates to address two critical security flaws impacting its operating system that could result in arbitrary code execution. Tracked as CVE-2023-23368 (CVSS score: 9.8), the vulnerability is described as a command injection bug affecting QTS, QuTS hero, and…

New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics

An updated version of an information stealer malware known as Jupyter has resurfaced with “simple yet impactful changes” that aim to stealthily establish a persistent foothold on compromised systems. “The team has discovered new waves of Jupyter Infostealer attacks which leverage PowerShell…

Palo Alto Networks to acquire Talon Cyber Security

Palo Alto Networks has entered into a definitive agreement to acquire Talon Cyber Security, a pioneer of Enterprise Browser technology. Talon’s Enterprise Browser provides a solution that, combined with Prisma SASE, will enable users to securely access business applications from…

Beyond Identity launches Okta Defense Kit to identify and prevent security vulnerabilities

Beyond Identity released the Okta Defense Kit, a duo of two preventative tools to help security and identity professionals identify and prevent security vulnerabilities, including those that contributed to recent breaches of the identity management service Okta. Okta has been…

Russian National Sanctioned For Virtual Currency Money Laundering

Zhdanova reportedly utilized cash, international money laundering associates and businesses fronts This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian National Sanctioned For Virtual Currency Money Laundering

Arid Viper | APT’s Nest of SpyC23 Malware Continues to Target Android Devices

Hamas-aligned threat actor delivers spyware through weaponized apps posing as Telegram or Skipped messenger. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and…

NIS2 Directive: Mitigating Risk Across Critical Industries

Learn how NIS2 requirements are being implemented across some Member States and gain guidance on what to include in your readiness plan to comply.        This article has been indexed from Fortinet Industry Trends Blog Read the original article: NIS2…

US slaps sanctions on accused fave go-to money launderer of Russia’s rich

And that includes ransomware crims, claims US of alleged sanctions-buster A Russian woman the US accuses of being a career money launderer is the latest to be sanctioned by the country for her alleged role in moving hundreds of millions…

Red Hat Device Edge ensures consistency across edge and hybrid cloud deployments

Red Hat has introduced Red Hat Device Edge, which offers a consistent platform designed for resource-constrained environments that necessitate small form-factor computing at the device edge. This includes Internet of Things (IoT) gateways, industrial controllers, smart displays, point-of-sale terminals, vending…

MITRE partners with Microsoft to address generative AI security risks

MITRE and Microsoft have added a data-driven generative AI focus to MITRE ATLAS, a community knowledge base that security professionals, AI developers, and AI operators can use as they protect AI-enabled systems. This new framework update and associated new case…

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system, potentially leading to full control.  Hackers typically exploit these vulnerabilities by crafting malicious code or commands…

American Airlines Pilot Union Recovering After Ransomware Attack

The Allied Pilots Association is restoring its systems after a file-encrypting ransomware attack. The post American Airlines Pilot Union Recovering After Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…

Here’s How RegTech is Transforming India’s Regulatory Landscape

  Businesses in India finish their GST returns for the month on the 20th of each month, believing their compliance work for the month is finished. However, they soon receive automated notices pointing out inconsistencies in their reporting. This procedure…

How Blockchain Technology Can Reshape Systems Via Computer Vision?

Blockchain technology vows to bring transformative changes in several sectors. Via ‘computer vision’ integration, blockchain has the potential to enhance the abilities of computer vision in several ways. This blog provides a detailed look at the benefits of integrating blockchain…

Security Executives: Navigating Cyber Liability Risks

Businesses and organizations across all industries now prioritize cybersecurity as a top priority in an increasingly digital world. Following cyber threats and breaches, security executives are facing increasing liability issues, as reported in recent studies. In addition to highlighting the…

Palo Alto Networks acquired Talon Cyber Security

Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…

The Journey of Becoming a Blockchain Developer

Blockchain solutions are becoming more popular, signaling a rising demand for professionals who develop these systems. Just six to eight years ago, the role of a blockchain developer was relatively obscure. Today, you can find these professionals networking in dedicated…

Meet Your New Cybersecurity Auditor: Your Insurer

As cyber insurance gets more expensive and competitive, security decision-makers have actionable opportunities to strengthen their cyber defenses. This article has been indexed from Dark Reading Read the original article: Meet Your New Cybersecurity Auditor: Your Insurer

Cisco Welcomes Rodney Clark to Lead Global Partner Sales

As Senior Vice President for Partnerships and Small & Medium Business, Rodney will empower Cisco’s global ecosystem of partners to maximize the massive opportunities in the Small and Medium Business segment. This article has been indexed from Cisco Blogs Read…

QNAP fixed two critical vulnerabilities in QTS OS and apps

Taiwanese vendor QNAP warns of two critical command injection flaws in the QTS operating system and applications on its NAS devices. Taiwanese vendor QNAP Systems addressed two critical command injection vulnerabilities, tracked as CVE-2023-23368 and CVE-2023-23369, that impact the QTS…

Ransomware gang continues to publish data stolen from Ontario hospitals

The Daxin Team ransomware group has released its third tranche of data stolen from southwestern Ontario hospitals that share an IT services provider because it can’t get a penny from the institutions. According to Canadian-based Emsisoft threat researcher Brett Callow,…

Wing Simulator enables developers to build and test Kubernetes applications

Wing Cloud, the company behind the open source programming language Winglang that works across all clouds, enhances their container support with the ‘Wing Simulator’ that enables developers to build and test their containerized applications locally. The Wing Simulator enables local…

SecuriDropper: New Android Dropper-as-a-Service Bypasses Google’s Defenses

Cybersecurity researchers have shed light on a new dropper-as-a-service (DaaS) for Android called SecuriDropper that bypasses new security restrictions imposed by Google and delivers the malware. Dropper malware on Android is designed to function as a conduit to install a payload on…

Cyera Adds Automated Remediation Capability to DSPM Platform

Cyera’s data security platform now includes the ability to employ tags to automatically apply cybersecurity policies to protect data. The post Cyera Adds Automated Remediation Capability to DSPM Platform appeared first on Security Boulevard. This article has been indexed from…

RedSense Compromised Credential Services 2.0 helps users prevent future incidents

RedSense released RedSense Compromised Credential Services 2.0. The new services include RedSense Credential Alert and RedSense Credential Investigator. RedSense has pioneered the use of AI to optimize stolen credential discovery on the dark web ensuring clients always have the most…

US, Japan and South Korea Unite to Counter North Korean Cyber Activities

The consultative body aims to tackle cyber-attacks used to fund Pyongyang’s weapons development, including its nuclear program This article has been indexed from www.infosecurity-magazine.com Read the original article: US, Japan and South Korea Unite to Counter North Korean Cyber Activities

Secure Your Web Applications With Facial Authentication

For the last three decades, web technology has remained relevant due to its versatile nature and wide range of applications in building solutions. The web runs virtually everything, from simple blog sites to complex and scalable web-based ERP systems in…

The Power of Resource-Oriented Programming in Cadence: A Deep Dive

Flow is a permissionless layer-1 blockchain built to support the high-scale use cases of games, virtual worlds, and the digital assets that power them. The blockchain was created by the team behind CryptoKitties, Dapper Labs, and NBA Top Shot. One…

Who’s Behind the SWAT USA Reshipping Service?

Last week, KrebsOnSecurity broke the news that one of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. In today’s Part II, we’ll examine clues about the real-life identity left…

Confirmed: Palo Alto has acquired Talon Cyber Security, sources say for $625M

Palo Alto Networks has just confirmed one more major piece of security startup M&A out of Israel: it has acquired Talon Cyber Security, a specialist in building enterprise browsers for securing distributed workforces sources. Source say the deal is valued…

Prisma® SASE and Talon to Secure the Rising Risk of Unmanaged Devices

Our intention to acquire Talon will enable customers to extend Prisma SASE’s leading Zero Trust and cloud-delivered security to unmanaged devices. The post Prisma® SASE and Talon to Secure the Rising Risk of Unmanaged Devices appeared first on Palo Alto…

Okta breach affected 134 orgs, ‘or less than 1%’ of customers, company admits

Plus: CVSS 4.0 is here, this week’s critical vulns, and ‘incident’ hit loan broker promises no late fees. Generous Infosec in brief  Okta has confirmed details of its October breach, reporting that the incident led to the compromise of files…

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks

Glibc vulnerability affecting major Linux distributions and tracked as Looney Tunables exploited in cloud attacks by Kinsing group.  The post ‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks  appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

US Sanctions Russian National for Helping Ransomware Groups Launder Money

The US Treasury has sanctioned Ekaterina Zhdanova for laundering money on behalf of cybercriminals and Russian elites. The post US Sanctions Russian National for Helping Ransomware Groups Launder Money appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Okta breach post mortem reveals weaknesses exploited by attackers

The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view and update customer support cases. “During our investigation into suspicious use of this account, Okta Security identified that an employee…

Worldwide Alliance: 50 Countries Join Forces Against Ransomware Attacks

  The technology giant has launched a new initiative in response to six high-profile cyberattacks that exploited different aspects of Microsoft’s security and cloud infrastructure in the past few years, which aimed to revamp the company’s approach to software security…

Impersonation Attack: Cybercriminals Impersonates AUC Head Using AI

Online fraudsters, in another shocking case, have used AI technology to pose as Moussa Faki Mahamat, the chairman of the African Union Commission. This bold cybercrime revealed gaps in the African Union (AU) leadership’s communication channels as imposters successfully mimicked…

Study: More Than 100 Research Projects Affected By X Changes

Study finds more than 100 research projects studying X, formerly Twitter, affected by changes by Elon Musk, amidst misinformation criticism This article has been indexed from Silicon UK Read the original article: Study: More Than 100 Research Projects Affected By…

6th Annual Partner Innovation Challenge: Remarkable Growth, Outstanding Winners

Cisco Partner Summit 2023 marks a significant moment—and the ideal stage for us to proudly unveil the victors of Cisco’s sixth annual global Partner Innovation Challenge. It’s an opportunity to shine a well-deserved spotlight on the remarkable innovation flowing from…

Exploitation of Critical Confluence Vulnerability Begins

Threat actors have started exploiting a recent critical vulnerability in Confluence Data Center and Confluence Server. The post Exploitation of Critical Confluence Vulnerability Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

Gaining Security and Flexibility With Private 5G

Private 5G is considered a safer alternative to Wi-Fi and public mobile networks and is the preferred network backbone for business-critical apps. The post Gaining Security and Flexibility With Private 5G appeared first on Security Boulevard. This article has been…

Cyber Security Today, Nov. 6, 2023 – Okta employee faulted for HAR hack, another US school board’s data stolen, and more

This episode reports on the cause of a recent hack at Okta, personal data stolen from the emaill of employees at a fast food chain, a proxy botnet foun This article has been indexed from IT World Canada Read the…

Canada Bans Kaspersky, WeChat On Govt Devices Suspecting Spying

The Government of Canada officially bans using WeChat and Kaspersky apps on government devices, citing… Canada Bans Kaspersky, WeChat On Govt Devices Suspecting Spying on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…

Check Point Recognized on the 2023 CRN Edge Computing 100 List

Today, accelerated cloud adoption and hybrid work require security to expand beyond the traditional network perimeter, making edge security a paramount focus. CRN’s fourth-annual Edge Computing 100 list honors trailblazing vendors leading the channel with next-generation technology that helps build…

Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure

Google warns of multiple threat actors that are leveraging its Calendar service as a command-and-control (C2) infrastructure. Google warns of multiple threat actors sharing a public proof-of-concept (PoC) exploit, named Google Calendar RAT, that relies on Calendar service to host command-and-control (C2)…

Chinese AI Start-Up Achieves $1bn Valuation In Eight Months

Beijing-based AI start-up 01.AI, founded by computer scientist Kai-Fu Lee, valued at more than $1bn less than eight months after founding This article has been indexed from Silicon UK Read the original article: Chinese AI Start-Up Achieves $1bn Valuation In…

Securing frontline Operational Technology environments

How Britvic outlawed security blind spots Webinar  Organisations in multiple industries often face risks which can severely impact their operational resilience. Cyber criminals like to use ransomware and vulnerable third-party connections to hijack operational technology (OT) systems which can stop…

Iranian APT Targets Israeli Education, Tech Sectors With New Wipers

The Iran-linked APT Agrius has been targeting higher education and technology organizations in Israel with new wipers. The post Iranian APT Targets Israeli Education, Tech Sectors With New Wipers appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Silobreaker AI enhances threat intelligence strategy

Silobreaker unveiled plans for its new generative AI tool, Silobreaker AI, which will provide assistance to threat intelligence teams tasked with collecting, analysing and reporting on intelligence requirements. With Silobreaker AI, analysts will be able to accelerate the production of…

China Invests Billions In Memory Firms In Face Of US Sanctions

Chinese state-backed companies invest billions in US-sanctioned YMTC and start-up CXMT as country looks to advance chip industry This article has been indexed from Silicon UK Read the original article: China Invests Billions In Memory Firms In Face Of US…

Corrupt Police Imprisoned for Revealing Investigation Secrets to Criminal

Natalie Mottram, a 25-year-old intelligence analyst who worked for Cheshire Police and the North West Regional Organised Crime Unit (ROCU), has been given a prison sentence of three years and nine months for her role in a serious security breach. …

New DDoS Attacks Waves. Cybersecurity Expert Robertino Matausch Explains HTTP/2 Rapid Reset

If you switched from using HTTP/1 to HTTP/2 you`re a possible target of massive DDoS attacks. Hackers started recently to exploit a key feature of the HTTP/2 protocol. The vulnerability was called CVE-2023-44487.  The HTTP/2 Rapid Reset DDoS attacks that targeted…

Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors

A cyberattack series by APT Agonizing Serpens (Agrius) targeting Israeli sectors started in January 2023. We analyze the novel wipers and other tools used. The post Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors appeared first…

Socks5Systemz Proxy Hacked 10,000+ Systems World Wide

Proxy services let users rent IP addresses and provide online anonymity by disguising their traffic as regular IP addresses while hiding the true source or origin. Bitsight researchers recently found a new malware sample distributed by the following two loaders:-…

Security Incident Response Policy

The Security Incident Response Policy from TechRepublic Premium describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. The policy’s purpose is to define for employees, IT department staff and users the process to…

Defeating Little Brother requires a new outlook on privacy: Lock and Code S04E23

This week on the Lock and Code podcast, we speak with Anna Brading and Mark Stockley from Malwarebytes about the apparent “appeal” of Little Brother surveillance, whether the tenets of privacy can ever fully defeat that surveillance, and what the…

Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors

Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware. The intrusions, which took place as recently as…

Is ChatGPT writing your code? Watch out for malware

Developers have long used sites like Stack Overflow as forums where they could get code examples and assistance. That community is rapidly being replaced by generative AI tools such as ChatGPT. Today, developers ask AI chatbots to help create sample code, translate…

A Cyber Breach Delays Poll Worker Training in Mississippi’s Largest County Before the Statewide Vote

Election officials in Mississippi’s most populous county had to scramble to complete required poll worker training after an early September breach involving county computers. The post A Cyber Breach Delays Poll Worker Training in Mississippi’s Largest County Before the Statewide…

Microsoft Says Exchange ‘Zero Days’ Disclosed by ZDI Already Patched or Not Urgent

Microsoft says four Exchange ‘zero-days’ disclosed by ZDI have either already been patched or they don’t require immediate attention. The post Microsoft Says Exchange ‘Zero Days’ Disclosed by ZDI Already Patched or Not Urgent appeared first on SecurityWeek. This article…

Atlassian Confluence data-wiping vulnerability exploited

Threat actors are trying to exploit CVE-2023-22518, a critical Atlassian Confluence flaw that allows unauthenticated attackers to reset vulnerable instances’ database, Greynoise is observing. The Shadowserver Foundation has also seen 30+ IP addresses testing for the flaw in internet-facing Confluence…

Gaming-related cyberthreats in 2023: Minecrafters targeted the most

Gaming-related threat landscape in 2023: desktop and mobile malware disguised as Minecraft, Roblox and other popular games, and the most widespread phishing schemes. This article has been indexed from Securelist Read the original article: Gaming-related cyberthreats in 2023: Minecrafters targeted…

What We Learned From “The Cyber-Resilient CEO” Report

In today’s digital landscape, cybersecurity is not just a technical concern; it’s a strategic imperative. As we delve into the insights from a recent report from Accenture titled ” The Cyber-Resilient CEO ,” we’ll uncover CEOs’ critical role in safeguarding…

What is Classiscam Scam-as-a-Service?

“The ‘Classiscam’ scam-as-a-service operation has broadened its reach worldwide, targeting many more brands, countries, and industries, causing more significant financial damage than before,” touts Bleeping Computer . So just what is it? What is Classiscam? It’s a bird. It’s a…

DDoS attack revealed as cause of online service outage at public healthcare institutions

The attack brought down internet connectivity for several organization in Singapore. This article has been indexed from Latest stories for ZDNET in Security Read the original article: DDoS attack revealed as cause of online service outage at public healthcare institutions

Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel

Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure. The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account.…

What are passkeys? Experience the life-changing magic of going passwordless

Here’s how to take the first steps toward ditching passwords for good. This article has been indexed from Latest stories for ZDNET in Security Read the original article: What are passkeys? Experience the life-changing magic of going passwordless

Socks5Systemz proxy service delivered via PrivateLoader and Amadey

Threat actors infected more than 10,000 devices worldwide with the ‘PrivateLoader’ and ‘Amadey’ loaders to recruit them into the proxy botnet ‘Socks5Systemz.’ Bitsight researchers uncovered a proxy botnet delivered, tracked as Socks5Systemz, which was delivered by PrivateLoader and Amadey loaders.…

Bolstering API Security and Bot Attack Protection with NSFOCUS Next-Generation WAF

NSFOCUS’s Next-Generation WAF addresses various threats faced by users, such as web vulnerability exploitation, resource abuse, and resource access control. It provides a comprehensive solution that includes traditional WAF functionality, bot traffic management, API security, and DDoS protection, all integrated…

‘Crypto King’ Sam Bankman-Fried Pleads Guilty Multi-billion Dollar Fraud

Sam Bankaman-Fried, the founder and CEO of the largest cryptocurrency exchange, has recently pleaded guilty to charges of fraud and money laundering. This news has sent shockwaves through the cryptocurrency community, as Bankaman-Fried was highly regarded and his exchange was…

Arid Viper Steals Sensitive Data From Android’s & Deploy Other Malware

According to recent reports, Arabic-speaking Android users have been targeted with spyware by the “Arid Viper” threat actor, also known as APT-C-23, Desert Falcon, or TAG-63). This threat actor has been using counterfeit dating apps designed to exfiltrate data from…

Sky’s the Limit, but What About API Security? Challenges in the Cloud-First Era

APIs enable cloud transformation but bring security risks, demanding robust, adaptive strategies to safeguard data and operations. This article has been indexed from Dark Reading Read the original article: Sky’s the Limit, but What About API Security? Challenges in the…

Keep Your Organization’s APIs Protected This Holiday Season

Understanding API security risks isn’t just a good idea — it’s a business imperative. A single API breach can lead to financial losses and reputational damage. This article has been indexed from Dark Reading Read the original article: Keep Your…

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

While both HITRUST and HIPAA have substantial relevance in ensuring data security in the healthcare sector, they are very different standards. HIPAA, or the Health Insurance Portability and Accountability Act of 1996, is a federal law, whereas HITRUST is a…

U.S. Treasury Sanctions Russian Money Launderer in Cybercrime Crackdown

The U.S. Department of the Treasury imposed sanctions against a Russian woman for taking part in the laundering of virtual currency for the country’s elites and cybercriminal crews, including the Ryuk ransomware group. Ekaterina Zhdanova, per the department, is said…

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys…

Exploring the global shift towards AI-specific legislation

In this Help Net Security interview, Sarah Pearce, Partner at Hunton Andrews Kurth, offers insights into the evolving landscape of AI legislation and its global impact. Pearce explores key principles, public participation, the future of AI laws in a world…

How global password practices are changing

Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse remains prevalent, however, leaving user accounts particularly vulnerable to password-spraying attacks if they’re not protected…

U.S. Treasury Targets Russian Money Launderer in Cybercrime Crackdown

The U.S. Department of the Treasury imposed sanctions against a Russian woman for taking part in the laundering of virtual currency for the country’s elites and cybercriminal crews, including the Ryuk ransomware group. Ekaterina Zhdanova, per the department, is said…

Cyber Attack news headlines trending on Google

1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…

Exploring Different Types of Cybersecurity: Protecting the Digital Realm

In our increasingly interconnected world, the importance of cybersecurity cannot be overstated. The rapid advancement of technology has led to more sophisticated cyber threats, making it essential for individuals, businesses, and governments to safeguard their digital assets. Cyber-security encompasses a…