The CryptoChameleon phishing kit is being leveraged by vishing attackers looking to trick LastPass users into sharing their master password. “Initially, we learned of a new parked domain (help-lastpass[.]com) and immediately marked the website for monitoring should it go live…
Tag: EN
FBI chief says China is preparing to attack US critical infrastructure
China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher Wray. FBI Director Christopher Wray warned this week that China-linked threat actors are preparing an attack against U.S. critical infrastructure, Reuters reported. According to the…
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR’s own processes and altered the mechanism to gain unique, persistent, and fully undetectable capabilities. The post The…
Google Chrome DBSC Protection Tested Against Cookie Attacks
In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently piloted its new Chrome DBSC. The device-bound session credentials (DBSC) are aimed at protecting users against cookie theft that threat actors may carry out using…
Crunching Some Numbers on PHP Support
PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still receiving security updates for the language, without introducing breaking changes to your application. The first and obvious question might be, “Why would I want…
NIS-2: 10 common misconceptions about the regulation
We wrote here about NIS2 and we will continue to add more content about it. Because we are getting closer to October 17th, many people are getting more and more nervous about NIS2. Despite its significance, there are numerous misconceptions…
United Nations Development Programme (UNDP) investigates data breach
The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack and the subsequent theft of data. The United Nations Development Programme (UNDP) is investigating an alleged ransomware attack that resulted in data theft. The United Nations…
Damn Vulnerable RESTaurant: Open-Source API Service Designed for Learning
Damn Vulnerable RESTaurant is an open-source project that allows developers to learn to identify and fix security vulnerabilities in their code through an interactive game. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Novel Android Malware Targets Korean Banking Users
A new banking Trojan is targeting Korean users using obfuscation techniques that target the Android manifest, exploit vulnerabilities and take advantage of weaknesses in how Android apps interpret this file. This article has been indexed from Cyware News – Latest…
The Ultimate Guide to SBIR and STTR Program Budgeting
The world advances based on innovation, and innovation can come from anywhere. The trouble is that the current capitalist economic system encourages large corporations to play conservatively with their products and their budgets while working to secure their own positions…
‘Crude’ Ransomware Tools Proliferating on the Dark Web for Cheap, Researchers Find
Researchers at the intelligence unit at the cybersecurity firm Sophos found 19 ransomware varieties being offered for sale or advertised as under development on four forums from June 2023 to February 2024. This article has been indexed from Cyware News…
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity company Kaspersky said it discovered the activity in February 2024, with evidence suggesting that it may have been active since at…
Possible Cyber Attack on 911 of 4 American States
The 911 emergency services experienced a significant outage in four states—Nebraska, South Dakota, Texas, and Nevada—sending shockwaves through the affected communities. Speculation points to a cyber attack orchestrated by Chinese intelligence, targeting all 50 states. However, only nine states were…
Can Ransomware Gangs Be Neutralized? Exploring Strategies to Combat Cyber Extortion
In recent years, ransomware attacks have emerged as one of the most pervasive and damaging cyber threats, with criminal gangs employing sophisticated tactics to extort money from individuals, businesses, and even government entities. As the frequency and severity of these…
Protobom: Open-source software supply chain tool
Protobom is an open-source software supply chain tool that enables all organizations, including system administrators and software development communities, to read and generate Software Bill of Materials (SBOMs), file data, and translate this data across standard industry SBOM formats. “he…
The key pillars of domain security
From branded emails and marketing campaigns to critical protocols, internal portals, and internet traffic, domains are central to digital enterprise operations. They are constantly created for new assets and initiatives. In this Help Net Security video, Mark Flegg, Global Director…
Lacework, last valued at $8.3B, is in talks to sell for just $150M to $200M, say sources
Consolidation continues apace in the world of security. Sources tell us that Lacework — a cloud security startup that was valued at $8.3 billion post-money in its last funding round — is in talks to be acquired by another security…
Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums
A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This exploit, which has not yet been assigned a Common Vulnerabilities and Exposures (CVE) reference, is said to be capable of…
New infosec products of the week: April 19, 2024
Here’s a look at the most interesting products from the past week, featuring releases from IDnow, Immuta, Privacera, Redgate, ShadowDragon, and Tanium. ShadowDragon Horizon enhancements help users conduct investigations from any device Horizon is accessible with any internet connection and…
51% of enterprises experienced a breach despite large security stacks
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according to Pentera.…