Sun.Jun 23, 2024

article thumbnail

Weekly Update 405

Troy Hunt

Ah, sunshine! As much as I love being back in Norway, the word "summer" is used very loosely there. Not as much in Greece, however, which is just spectacular: Finally escaped the bitterly cold Norwegian summer for something… warmer 🇬🇷 pic.twitter.com/jk9knZvJar — Troy Hunt (@troyhunt) June 17, 2024 3 nights in Mykonos, 2 in Santorini and I'm pushing this post out just before our second night in Athens before embarking on the long journey home.

article thumbnail

Navigating the CISO Role: Common Pitfalls for New Leaders

Lohrman on Security

What are the top mistakes that I see new security leaders continue to make in 2024 as they start their CISO careers or take on new roles? How can these challenges be addressed?

CISO 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Facebook PrestaShop module exploited to steal credit cards

Bleeping Computer

Hackers are exploiting a flaw in a premium Facebook module for PrestaShop named pkfacebook to deploy a card skimmer on vulnerable e-commerce sites and steal people's payment credit card details. [.

130
130
article thumbnail

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

The Hacker News

Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet their operational objectives by masquerading it as Instagram, WhatsApp, and various e-commerce and antivirus apps.

Antivirus 130
article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

AdsExhaust: New Adware Masquerading as Oculus Installer Wreaks Havoc

Penetration Testing

In a recent report, the eSentire Threat Response Unit (TRU) has uncovered a sophisticated adware strain dubbed AdsExhaust, cunningly disguised as the Oculus installer application. Discovered in June 2024, this malicious software has been... The post AdsExhaust: New Adware Masquerading as Oculus Installer Wreaks Havoc appeared first on Cybersecurity News.

Adware 108
article thumbnail

Microsoft Photos update brings requested features to Windows 11

Bleeping Computer

Microsoft's updated Photos app is now available for Windows 11 in the Windows Insider Program, bringing requested interface changes and better image quality. [.

Software 108

More Trending

article thumbnail

RansomHub: A New Ransomware-as-a-Service Threatens Multiple Operating Systems

Penetration Testing

A new ransomware-as-a-service (RaaS) called RansomHub has emerged, targeting Windows, Linux, and ESXi operating systems. This multi-OS capability makes it a significant threat to a wide range of organizations. RansomHub affiliates are offered a... The post RansomHub: A New Ransomware-as-a-Service Threatens Multiple Operating Systems appeared first on Cybersecurity News.

article thumbnail

Threat actor attempts to sell 30 million customer records allegedly stolen from TEG

Security Affairs

A threat actor is offering for sale customer data allegedly stolen from the Australia-based live events and ticketing company TEG. TEG (Ticketek Entertainment Group) is an Australian company that operates in the live entertainment and ticketing industry. The company operates across multiple countries and sells over 30 million tickets annually for more than 30,000 events, including live sports, concerts, theatre, festivals, and exhibitions.

article thumbnail

CVE-2024-5756 (CVSS 9.8): Critical Icegram Express Flaw Puts 90,000 WordPress Sites at Risk

Penetration Testing

A critical vulnerability in Icegram Express, a popular email marketing plugin for WordPress with over 90,000 active installations, could put sensitive user data at risk. Tracked as CVE-2024-5756 (CVSS 9.8), the flaw allows unauthenticated... The post CVE-2024-5756 (CVSS 9.8): Critical Icegram Express Flaw Puts 90,000 WordPress Sites at Risk appeared first on Cybersecurity News.

Risk 68
article thumbnail

Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

Security Boulevard

In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should be stored in web browsers, potentially sparking strong opinions. The hosts also provide an update on Microsoft’s delayed release of CoPilot Plus PCs […] The post Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

Media 59
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CVE-2024-27815: Apple XNU Kernel Vulnerability Uncovered, PoC Code Released

Penetration Testing

A security researcher has published details and proof-of-concept (PoC) code for a CVE-2024-27815 vulnerability in the XNU kernel that could be exploited to execute arbitrary code with kernel privileges. The vulnerability was introduced in... The post CVE-2024-27815: Apple XNU Kernel Vulnerability Uncovered, PoC Code Released appeared first on Cybersecurity News.

article thumbnail

USENIX Security ’23 – Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring

Security Boulevard

Authors/Presenters: David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

article thumbnail

Zyxel NAS Devices Under Attack: CVE-2024-29973 Exploitation Attempts by Mirai-Like Botnet

Penetration Testing

Shadowserver, a leading threat monitoring platform, has raised a red flag regarding the active exploitation of a critical vulnerability in Zyxel NAS devices. The flaw, tracked as CVE-2024-29973 (CVSS 9.8), allows unauthenticated attackers to... The post Zyxel NAS Devices Under Attack: CVE-2024-29973 Exploitation Attempts by Mirai-Like Botnet appeared first on Cybersecurity News.

article thumbnail

Decoding the Rise of Zero-Trust Adoption in Government Sector

Security Boulevard

As cyber threats become increasingly sophisticated, government sectors turn to Zero-Trust architecture to revolutionize their cybersecurity measures. This strategy is crucial for safeguarding sensitive information and maintaining national security. The post Decoding the Rise of Zero-Trust Adoption in Government Sector appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Rafel RAT Malware: A Growing Cybersecurity Threat to Android Devices

Penetration Testing

Check Point Research has released a comprehensive report detailing the alarming rise of Rafel RAT, an open-source Android malware that has been weaponized by a diverse range of threat actors, from espionage groups to... The post Rafel RAT Malware: A Growing Cybersecurity Threat to Android Devices appeared first on Cybersecurity News.

Malware 45
article thumbnail

The End of Our Dog Era

Security Boulevard

"That's the end of our Joplin era," my wife said to my oldest daughter. We were still crying and wiping our tears. I didn't say it out loud, but I thought "That was the end of our dog era," We'd just returned to the car from the vet's office where the three of us, through tears, accompanied our 15 year old black lab to the end of her life. Joplin had been the runt of her mother's litter.

article thumbnail

GrimResource: A New Cybersecurity Threat Exploiting Microsoft Management Console

Penetration Testing

Elastic Security Labs has recently uncovered a novel cyberattack technique dubbed “GrimResource,” which leverages specially crafted MSC files to gain unauthorized code execution within Microsoft Management Console (mmc.exe). The GrimResource technique capitalizes on an... The post GrimResource: A New Cybersecurity Threat Exploiting Microsoft Management Console appeared first on Cybersecurity News.

article thumbnail

Navigating the CISO Role: Common Pitfalls for New Leaders

Security Boulevard

What are the top mistakes that I see new security leaders continue to make in 2024 as they start their CISO careers or take on new roles? How can these challenges be addressed? The post Navigating the CISO Role: Common Pitfalls for New Leaders appeared first on Security Boulevard.

CISO 45
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Security Affairs newsletter Round 477 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. US government sanctions twelve Kaspersky Lab executives Experts found a bug in the Linux version of RansomHub ransomware UEFICANHAZBUFFEROVERFLOW flaw in Phoenix SecureCore UEFI firmware potentially impacts hundreds of PC and server models Russia-linked A