Category: EN

Sophos Web Appliance vulnerability exploited in the wild (CVE-2023-1671)

CISA has added three vulnerabilities to its Known Exploited Vulnerabilities catalog, among them a critical vulnerability (CVE-2023-1671) in Sophos Web Appliance that has been patched by the company in April 2023. About CVE-2023-1671 CVE-2023-1671 is a pre-auth command injection vulnerability…

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts. The method is designed to “delay detonation of the sample…

Why Defenders Should Embrace a Hacker Mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal…

Navigating the Waters of AI: Safeguarding Against Data Security Risks

In the era of rapid technological advancement, artificial intelligence (AI) has emerged as a powerful tool with transformative potential across various industries. While AI brings unprecedented opportunities, it also introduces new challenges, particularly in the realm of data security. As…

250 Organizations Take Part in Electrical Grid Security Exercise

Over 250 organizations take part in GridEx VII, the largest North American exercise focusing on the security of the electrical grid. The post 250 Organizations Take Part in Electrical Grid Security Exercise appeared first on SecurityWeek. This article has been…

How are Crypto Phishing Scams Done, and How Do You Avoid Them?

Crypto phishing scams are fraudulent activities designed to steal your cryptocurrency assets, typically by tricking you into revealing your private keys or sending your cryptocurrencies to the scammer’s wallet. These scams often involve deception, social engineering, and manipulation. Here’s how…

DarkGate Internals

Introduction & Objectives DarkGate is sold as Malware-as-a-Service (MaaS) on various cybercrime forums by RastaFarEye persona, in the past months it has been used by multiple threat actors such as TA577 and Ducktail. DarkGate is a loader with RAT capabilities…

Now a Stock Market business hires hackers

Six Group, a technology firm responsible for securing the operations of Spanish and Swiss Bourses, is actively recruiting hackers to counter sophisticated attempts to breach its network. The motivation behind hiring these cybersecurity experts is to gain insights into the…

Change Variance: How Tiny Differences Can Impact Your IT World

In the vast and ever-evolving universe of information technology, there’s one constant: change (that and cliches about constants!). Servers, systems, and software – they all get updated and modified. But, have you ever stopped to consider how even tiny differences…

Phishing Trends Examined by the SANS Institute

Earlier this year, the SANS Institute published a blog exploring emerging phishing trends. This kind of research is an invaluable resource for all individuals and organizations looking to identify and rebuff phishing attacks. In this article, we’ll cover some of…

Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and unauthorized access. Affected are platforms that are essential for hosting and deploying large language models, including Ray,…

DarkCasino joins the list of APT groups exploiting WinRAR zero-day

The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831. Researchers at cybersecurity firm NSFOCUS analyzed DarkCasino attack pattern exploiting the WinRAR zero-day vulnerability tracked as CVE-2023-38831. The economically motivated APT group used specially crafted archives…

‘123456’ Crackable in seconds, 2023’s Most Prevalent Password

For half a decade, NordPass has delved into the realm of password habits, uncovering familiar tunes that persist.  However, this year’s narrative is layered with intriguing patterns, particularly within distinct platform categories.  Amidst the discourse on passkeys, a question lingers:…

A week in security (November 13 – November 19)

A list of topics we covered in the week of November 13 to November 19 of 2023 This article has been indexed from Malwarebytes Read the original article: A week in security (November 13 – November 19)

A Detection and Response Benchmark Designed for the Cloud

Does your security operation center’s performance meet the 5/5/5 benchmark for cloud threat detection and incident response? This article has been indexed from Dark Reading Read the original article: A Detection and Response Benchmark Designed for the Cloud

OracleIV DDoS Botnet Alert: Secure Your Docker Engine APIs

Attention Docker users: a new threat known as OracleIV is on the rise, targeting publicly accessible Docker Engine API instances. Researchers from Cado have uncovered a campaign where attackers exploit misconfigurations to turn machines into a distributed denial-of-service (DDoS) botnet.…

9 Black Friday cybersecurity deals you don’t want to miss

PortDroid PortDroid is a trusted app for all network analysis tasks. Designed with network administrators, penetration testers, and technology enthusiasts in mind, this app brings a collection of essential networking tools right at your fingertips. Deal: 50% off Promo code:…

How effective compensation makes a difference with cyber talent retention

Aligning cybersecurity organization models with business objectives enables talent retention and security program success, according to IANS and Artico Search. CISOs’ role in organizational and staffing decisions Fortune firms with annual revenues exceeding $6 billion generally operate large and specialized…

MFA under fire, attackers undermine trust in security measures

In this Help Net Security video, Renée Burton, Head of Threat Intelligence at Infoblox, discusses MFA attacks. MFA adds security to online accounts, but MFA lookalikes are a real threat to consumers and enterprises. Consumers have come to trust MFA,…

Smaller businesses embrace GenAI, overlook security measures

Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT decision makers, although 89% of organizations consider GenAI tools like ChatGPT to be a potential…

Outsmarting cybercriminals is becoming a hard thing to do

Cybercriminals have evolved into organized and highly adaptive networks, collaborating globally to exploit weaknesses in cybersecurity defenses. Their motivations range from financial gain and information theft to political espionage and ideological warfare. Cybercriminals, now more than ever, are exploiting vulnerabilities…

Only 9% of IT budgets are dedicated to security

Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organization’s security and compliance strategy as reactive, according to Vanta. The expansion of attack surfaces in a post-pandemic hybrid world,…

Your password hygiene remains atrocious, says NordPass

ALSO: FCC cracks down on SIM-swap scams, old ZeroLogon targeted by new ransomware, and critical vulnerabilities Infosec in brief  It’s that time of year again – NordPass has released its annual list of the most common passwords. And while it…

CrowdStrike Extends AI Approach to Cybersecurity to SMBs

CrowdStrike Falcon Go enables small-to-medium businesses (SMBs) to leverage machine learning algorithms to secure their IT environments. The post CrowdStrike Extends AI Approach to Cybersecurity to SMBs appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Insider Risk Digest: Week 45-46

This Article Insider Risk Digest: Week 45-46 was first published on Signpost Six. | https://www.signpostsix.com/ Introduction In this edition of our Insider Risk Digest for weeks 45-46, we highlight a disturbing case of workplace violence, and the role that organisational…

SSE vs. Traditional Security Models – The Variances

In today’s hyper-connected digital world, cybersecurity stands as a paramount concern, with organizations seeking robust solutions to protect… The post SSE vs. Traditional Security Models – The Variances appeared first on Hackers Online Club (HOC). This article has been indexed…

AI/ML Tools Uncovered with 12+ Vulnerabilities Open to Exploitation

  Since August 2023, individuals on the Huntr bug bounty platform dedicated to artificial intelligence (AI) and machine learning (ML) have exposed more than a dozen vulnerabilities that jeopardize AI/ML models, leading to potential system takeovers and theft of sensitive…

Bengaluru Police Bust Rs 854 Crore Cyber Fraud

The Bengaluru Police have made significant progress in uncovering a sophisticated cyber investment fraud that involved an astonishing amount of Rs 854 crore. The study clarifies the complex network of mule accounts that was essential to carrying out this financial…

Bing Chat Rebrands to ‘Copilot’: What is New?

Bing Chat has been renamed as ‘Copilot,’ according to an announcement made during Microsoft Ignite 2023. But, is the name change the only new thing the users will be introduced with? The answer could be a little ambiguous.  What is…

How to Protect Your Black Friday and Cyber Monday Shopping

Don’t let the most wonderful time of the year turn into a holiday crisis. Here’s help to shop securely online this holiday season. The post How to Protect Your Black Friday and Cyber Monday Shopping appeared first on Security Boulevard.…

8Base ransomware operators use a new variant of the Phobos ransomware

8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks. Cisco Talos researchers observed 8Base ransomware operators using a variant of the Phobos ransomware in recent attacks. Phobos variants are usually distributed by the SmokeLoader,…

Network Segmentation Guide: Essential Security Best Practices Revealed

Unlocking the Power of Network Segmentation: A Comprehensive Guide for Enhanced Security In the dynamic world of cybersecurity, network segmentation emerges as a pivotal strategy for safeguarding digital assets. This practice involves dividing a computer network into smaller, distinct segments…

Microsoft’s Purview: A Leap Forward in AI Data Security

Microsoft has once again made significant progress in the rapidly changing fields of artificial intelligence and data security with the most recent updates to Purview, its AI-powered data management platform. The ground-breaking innovations and improvements included in the most recent…

Dark Effects of Bot Attacks that Drive 73% of Internet Traffic

In a chilling revelation, the cybercrime economy is projected to soar to $10.5 trillion by 2025, driven by financially motivated bad actors orchestrating dark enterprises.  Uncover the intricate web of these malicious activities and the alarming surge in cyber threats.…

AI Demystified: Unraveling Artificial Intelligence (AI)

As the world continues to progress, so does its technology. Artificial Intelligence (AI) has become a major milestone in this advancement, bringing with it countless… The post AI Demystified: Unraveling Artificial Intelligence (AI) appeared first on Security Zap. This article…

Five Cybersecurity Predictions for 2024

“Over the past year, we’ve witnessed significant developments in cybersecurity, including the emergence of generative AI and its ability to enhance organizations’ threat intelligence efforts, and the rise of Threat Exposure Management, a program of consolidation to identify and mitigate…

Microsoft Windows To Release Copilot For AI And Security

Microsoft’s AI technology is now accessible on an additional 1 billion devices.. What is Copilot in Windows? New… The post Microsoft Windows To Release Copilot For AI And Security appeared first on Hackers Online Club (HOC). This article has been…

Addressing Legacy System Patching Neglect

By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…

To Navigate Cyberattacks Effectively, Start with Empathy

By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…

Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine

Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB. Check Point researchers observed Russia-linked Gamaredon spreading the worm called LitterDrifter via USB in attacks against Ukraine. Gamaredon (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) has been active since 2014 and its activity…

How to Increase Your WiFi Speed in Five Simple Steps

  If you’re here, you’re probably interested in learning how to boost your home WiFi speed. We expect the internet to function at steady speed as it has become a vital part of daily life. Otherwise, it may lead to…

The Startup That Transformed the Hack-for-Hire Industry

Plus: The FBI’s baffling inaction on a ransomware group, a massive breach of Danish electric utilities, and more. This article has been indexed from Security Latest Read the original article: The Startup That Transformed the Hack-for-Hire Industry

Top 10 Cutting-Edge Technologies Set to Revolutionize Cybersecurity

  In the present digital landscape, safeguarding against cyber threats and cybercrimes is a paramount concern due to their increasing sophistication. The advent of new technologies introduces both advantages and disadvantages.  While these technologies can be harnessed for committing cybercrimes,…

Inside the Race to Secure the F1 Las Vegas Grand Prix

Beyond the blinding speeds and sharp turns on new terrain, the teams at this weekend’s big F1 race are preparing for another kind of danger. This article has been indexed from Security Latest Read the original article: Inside the Race…

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals. “Most of the group’s…

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon’s (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded…

Protect your eBay account with Authenticator apps

Users of eBay had several options up until now to improve account login security using 2-step verification. They could get texts or emails from eBay that contain the code, or get codes […] Thank you for being a Ghacks reader.…

Kubernetes Security on AWS: A Practical Guide

Kubernetes security is safeguarding your Kubernetes clusters, the applications they host, and the infrastructure they rely on from threats. As a container orchestration platform, Kubernetes is incredibly powerful but presents a broad attack surface for potential adversaries. Kubernetes security encompasses…

Tech Trends 2023: Staying Ahead of the Curve

Recent technological advances have been nothing short of explosive. From Artificial Intelligence to Autonomous Vehicles, current trends in technology are revolutionizing the way people interact… The post Tech Trends 2023: Staying Ahead of the Curve appeared first on Security Zap.…

DEF CON 31 XRVillage – Brittan Heller’s ‘Fireside Chat’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

The board of directors of OpenAI fired Sam Altman

OpenAI fired its CEO Sam Altman, and the Chief technology officer Mira Murati appointed interim CEO to lead the company. Sam Altman has been removed as CEO of OpenAI. The company announced that Mira Murati, the Chief Technology Officer, has…

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics. This article has been indexed from Dark Reading Read the original article: Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

On His 42nd Birthday, Alaa Abd El Fattah’s Family Files UN Petition for His Release

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Today is the birthday of Alaa Abd El Fattah, a prominent Egyptian-British coder, blogger, activist, and one of the most high-profile political prisoners in the entire Arab world.…

Acuity – 14,055,729 breached accounts

In mid-2020, a 437GB corpus of data attributed to an entity named "Acuity" was created and later extensively distributed. However, the source could not be confidently verified as any known companies named Acuity. The data totalled over 14M unique email…

Reflecting on 20 years of Patch Tuesday

This year is a landmark moment for Microsoft as we observe the 20th anniversary of Patch Tuesday updates, an initiative that has become a cornerstone of the IT world’s approach to cybersecurity. Originating from the Trustworthy Computing memo by Bill…

CVE-2023-4966 vulnerability becomes a global problem

Threat researcher Kevin Beaumont has been tracking attacks against various companies, including the Industrial and Commercial Bank of China (ICBC), DP World, Allen & Overy, and Boeing, and found they had something […] Thank you for being a Ghacks reader.…

An introduction to IoT penetration testing

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: An introduction to IoT penetration testing

Scattered Spider Casino Hackers Evade Arrest in Plain Sight

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes? This article has been indexed from Dark Reading Read the original article:…

Evolving beyond your core expertise: it’s time to add security

This post is for creators of digital services like optimization tools,  VPN solutions, Backup and Disaster Recovery tools, Parental control tools, Identity protection tools, Privacy tools, Email clients, Browsers and many others. Your products are doing a good job in…

Medusa ransomware gang claims the hack of Toyota Financial Services

Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. Toyota Financial Services confirmed the discovery of unauthorized activity on systems in a limited number of its locations. “Toyota Financial Services…