In the first timeline of June 2024 I collected 124 events (8.27 events/day) with a threat landscape dominated by… This article has been indexed from HACKMAGEDDON Read the original article: 1-15 June 2024 Cyber Attacks Timeline
Tag: EN
New PIXHELL Acoustic Attack Leaks Secrets From LCD Screen Noise
New acoustic attack named ‘PIXHELL’ can leak secrets from air-gapped systems through LCD monitors without speakers. Malware modulates pixel patterns to induce noise in the 0-22 kHz range, allowing data exfiltration up to 2 meters at 20 bps. This article…
Microsoft Discloses Four Zero-Days in September Update
Microsoft recently revealed four zero-day vulnerabilities in its September update, part of the Patch Tuesday release containing 79 vulnerabilities, making it the fourth-largest release of the year. This article has been indexed from Cyware News – Latest Cyber News Read…
Healthcare Provider to Pay $65M Settlement Following Ransomware Attack
Lehigh Valley Health Network has agreed to pay a $65 million settlement in a class-action suit filed over a 2023 data breach. The post Healthcare Provider to Pay $65M Settlement Following Ransomware Attack appeared first on SecurityWeek. This article has…
US Elections: Iranian Hackers Target Political Campaigns
With elections, there have always been accusations of rigging and corruption and it’s possible that such claims may hold some truth in different countries worldwide. However, the US elections have recently been subjected to the influence of cybercrime. Such a…
Ubuntu 24.04.1 LTS Released: This is What’s New
Canonical’s Ubuntu 24.04 LTS, codenamed “Noble Numbat” has received its first major update: Ubuntu 24.04.1. This release, which arrived a bit later than initially planned due to some high-impact bugs, brings a host of improvements and enhancements to the popular…
BYOD Policies Fueling Security Risks
The use of employee mobile devices at work, or bring your own device (BYOD), is a significant and growing threat to organizational security. The post BYOD Policies Fueling Security Risks appeared first on Security Boulevard. This article has been indexed…
Business Email Compromise Costs $55bn Over a Decade
New FBI data reveals BEC scams have cost businesses more than $55bn since 2013 This article has been indexed from www.infosecurity-magazine.com Read the original article: Business Email Compromise Costs $55bn Over a Decade
Who Is Responsible for Securing SaaS Tools?
Haven’t we already discussed at great length the cloud shared security model? We’ve had the cloud for a few decades. Why can’t we just extend that shared responsibility model for […] The post Who Is Responsible for Securing SaaS Tools?…
Cybersecurity News: $20 WHOIS vulnerability, India’s Cyber Commandos, Word hits drone makers
The $20 WHOIS vulnerability Researchers at watchTowr Labs discovered the WHOIS server for the .mobi top-level domain migrated domains, so they spent $20 to acquire the legacy one and spun […] The post Cybersecurity News: $20 WHOIS vulnerability, India’s Cyber…
Mind your header! There’s nothing refreshing about phishers’ latest tactic
It could lead to a costly BEC situation Palo Alto’s Unit 42 threat intel team wants to draw the security industry’s attention to an increasingly common tactic used by phishers to harvest victims’ credentials.… This article has been indexed from…
Exploiting CI/CD Pipelines for Fun and Profit
On September 8, 2024, a significant exploit chain was discovered, starting from a publicly exposed . git directory, leading to a full server takeover. The vulnerabilities stem from websites exposing their . git folders. This article has been indexed from…
ToneShell Backdoor Targets IISS Defence Summit Attendees in Latest Espionage Campaign
The ToneShell backdoor, attributed to the Mustang Panda cyber espionage group, has resurfaced in a new attack targeting attendees of the 2024 IISS Defence Summit in Prague. This article has been indexed from Cyware News – Latest Cyber News Read…
NIS2, DORA, and Tiber-EU expanding cybersecurity regulation
Get essential insights for IT security compliance and effectiveness from SANS Webinar As cybersecurity threats evolve, so do the regulations designed to protect businesses.… This article has been indexed from The Register – Security Read the original article: NIS2, DORA,…
Open Source Updates Have 75% Chance of Breaking Apps
Endor Labs claims security patches can break underlying open source software 75% of the time This article has been indexed from www.infosecurity-magazine.com Read the original article: Open Source Updates Have 75% Chance of Breaking Apps
New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks
SCATTERED SPIDER, a ransomware group, leverages cloud infrastructure and social engineering to target insurance and financial institutions by using stolen credentials, SIM swaps, and cloud-native tools to gain and maintain access, impersonating employees to deceive victims. Their partnership with BlackCat…
VirtualBox 7.1: This is a major update, here’s what’s new
VirtualBox is a full virtualizer for x86 hardware designed for servers, desktops, and embedded systems. VirtualBox 7.1 introduces an enhanced user interface, cloud VM management, ARM support, Wayland compatibility, and more. New features in VirtualBox 7.1 This is a major…
Cloudera Private Link Network helps enterprises protect their data
Cloudera launched Cloudera Private Link Network to address critical data security and privacy concerns for highly regulated organizations with strict internal data security policies. Cloudera Private Link Network provides secure, private connectivity from customer workloads to the Cloudera Control Plane,…
Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks
Phishing remains a significant concern for both individuals and organizations. Recent findings from ThreatLabz have highlighted the alarming prevalence of phishing attacks targeting major brands, with Google, Microsoft, and Amazon emerging as the top three most impersonated companies. This article…
Adobe Patch Tuesday security updates fixed multiple critical issues in the company’s products
Adobe addressed tens of vulnerabilities, including critical issues that could allow attackers to execute arbitrary code on Windows and macOS. Adobe Patch Tuesday security updates addressed multiple vulnerabilities in its products, including critical flaws that could allow attackers to execute…