Sat.Aug 10, 2024

article thumbnail

Weekly Update 412

Troy Hunt

When is a breach a breach? If it's been breached then re-breached , is the second incident still a breach? Here's what the masses said when I asked if they'd want to know when something like this happened to their data: If you're in a breach and your data is aggregated by a third party, then *they* have a breach that discloses your data (again), would you want to know?

241
241
article thumbnail

New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

The Hacker News

An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software.

Adware 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks took control of a cow milking robot causing the death of a cow

Security Affairs

Crooks took control of a cow milking robot and demanded a ransom from a farmer who refused to pay it, resulting in the death of a cow. An extortion attempt had a tragic outcome, cybercriminals took control of a cow milking robot and demanded a ransom from a farmer, but he did not pay, resulting in the death of a cow. In November 2023, farmer Vital Bircher received a message from his milking robot on his phone, then he noticed that the device’s display was blank and was missing essential da

article thumbnail

Researchers Uncover 10 Flaws in Google's File Transfer Tool Quick Share

The Hacker News

As many as 10 security flaws have been uncovered in Google's Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed.

Software 132
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Is the INC ransomware gang behind the attack on McLaren hospitals?

Security Affairs

A INC Ransom ransomware attack this week disrupted IT and phone systems at McLaren Health Care hospitals. On Tuesday, an INC Ransom ransomware attack hit the McLaren Health Care hospitals and disrupted their IT and phone systems. The organizations did not disclose details about the attack, however Bleeping Computer noticed that employees at McLaren Bay Region Hospital in Bay City have shared a ransom note warning that the hospital was hit by INC RANSOM ransomware group.

article thumbnail

Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look

WIRED Threat Level

On the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more.

97

More Trending

article thumbnail

Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All

WIRED Threat Level

Security researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources.

Hacking 106
article thumbnail

GL-iNet Routers Exposed to Critical Vulnerabilities: Urgent Firmware Updates Required

Penetration Testing

GL-iNet has recently issued a security advisory addressing multiple critical vulnerabilities in several of their router models. The vulnerabilities, tracked under CVE-2024-39225 through CVE-2024-39229 and CVE-2024-3661, expose users to severe... The post GL-iNet Routers Exposed to Critical Vulnerabilities: Urgent Firmware Updates Required appeared first on Cybersecurity News.

article thumbnail

The Hacker Who Hunts Video Game Speedrunning Cheaters

WIRED Threat Level

Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that's stood for 15 years.

100
100
article thumbnail

Emulating Humans for Cybercrime Purposes

Security Boulevard

It's 2009 and I just stumbled upon the extremely sophisticated Xedant Human Emulator (XHE) (hxxp://humanemulator.info) which basically automates human interactions with Web and online properties to the point of sophisticated and was in a way heavily advertised on various cybercrime-friendly forum communities back in the day. Primary project's contact points: humanemulator@gmail.com ICQ: 420-444-071 WebMoney: Z898663059839 Some of its features include: submission of information to the web - for

article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

Vuls: A Comprehensive Vulnerability Management Solution for Modern IT Environments

Penetration Testing

The ever-growing complexity of modern IT infrastructure, coupled with the relentless proliferation of cyber threats, places a substantial burden on system administrators tasked with maintaining a robust security posture. Manual... The post Vuls: A Comprehensive Vulnerability Management Solution for Modern IT Environments appeared first on Cybersecurity News.

article thumbnail

USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classification Techniques

Security Boulevard

Authors/Presenters:Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel. Permalink The post USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classificatio

article thumbnail

STAC6451: A Threat Group Targeting Indian Organizations with Mimic Ransomware

Penetration Testing

Sophos MDR threat hunters and intelligence analysts have recently unveiled a new threat activity cluster, dubbed STAC6451, that is actively targeting organizations in India with Mimic ransomware. This group exploits... The post STAC6451: A Threat Group Targeting Indian Organizations with Mimic Ransomware appeared first on Cybersecurity News.

article thumbnail

2024 US Election Faces Escalating Iranian Cyber Influence, MTAC Warns

Penetration Testing

As the 2024 US presidential election approaches, the Microsoft Threat Analysis Center (MTAC) has reported a significant escalation in cyber-enabled influence operations originating from Iran. This marks the third consecutive... The post 2024 US Election Faces Escalating Iranian Cyber Influence, MTAC Warns appeared first on Cybersecurity News.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.