Sat.Aug 10, 2024

article thumbnail

Weekly Update 412

Troy Hunt

When is a breach a breach? If it's been breached then re-breached , is the second incident still a breach? Here's what the masses said when I asked if they'd want to know when something like this happened to their data: If you're in a breach and your data is aggregated by a third party, then *they* have a breach that discloses your data (again), would you want to know?

257
257
article thumbnail

New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

The Hacker News

An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software.

Adware 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks took control of a cow milking robot causing the death of a cow

Security Affairs

Crooks took control of a cow milking robot and demanded a ransom from a farmer who refused to pay it, resulting in the death of a cow. An extortion attempt had a tragic outcome, cybercriminals took control of a cow milking robot and demanded a ransom from a farmer, but he did not pay, resulting in the death of a cow. In November 2023, farmer Vital Bircher received a message from his milking robot on his phone, then he noticed that the device’s display was blank and was missing essential da

article thumbnail

Researchers Uncover 10 Flaws in Google's File Transfer Tool Quick Share

The Hacker News

As many as 10 security flaws have been uncovered in Google's Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed.

Software 139
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Is the INC ransomware gang behind the attack on McLaren hospitals?

Security Affairs

A INC Ransom ransomware attack this week disrupted IT and phone systems at McLaren Health Care hospitals. On Tuesday, an INC Ransom ransomware attack hit the McLaren Health Care hospitals and disrupted their IT and phone systems. The organizations did not disclose details about the attack, however Bleeping Computer noticed that employees at McLaren Bay Region Hospital in Bay City have shared a ransom note warning that the hospital was hit by INC RANSOM ransomware group.

article thumbnail

Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All

WIRED Threat Level

Security researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources.

Hacking 136

More Trending

article thumbnail

The Hacker Who Hunts Video Game Speedrunning Cheaters

WIRED Threat Level

Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that's stood for 15 years.

130
130
article thumbnail

QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share

Security Boulevard

See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR's own processes and altered the mechanism to gain unique, persistent, and fully undetectable capabilities. The post QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share appeared first on SafeBreach.

69
article thumbnail

Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look

WIRED Threat Level

On the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more.

130
130
article thumbnail

Emulating Humans for Cybercrime Purposes

Security Boulevard

It's 2009 and I just stumbled upon the extremely sophisticated Xedant Human Emulator (XHE) (hxxp://humanemulator.info) which basically automates human interactions with Web and online properties to the point of sophisticated and was in a way heavily advertised on various cybercrime-friendly forum communities back in the day. Primary project's contact points: humanemulator@gmail.com ICQ: 420-444-071 WebMoney: Z898663059839 Some of its features include: submission of information to the web - for

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Vuls: A Comprehensive Vulnerability Management Solution for Modern IT Environments

Penetration Testing

The ever-growing complexity of modern IT infrastructure, coupled with the relentless proliferation of cyber threats, places a substantial burden on system administrators tasked with maintaining a robust security posture. Manual... The post Vuls: A Comprehensive Vulnerability Management Solution for Modern IT Environments appeared first on Cybersecurity News.

article thumbnail

USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classification Techniques

Security Boulevard

Authors/Presenters:Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel. Permalink The post USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classificatio

article thumbnail

STAC6451: A Threat Group Targeting Indian Organizations with Mimic Ransomware

Penetration Testing

Sophos MDR threat hunters and intelligence analysts have recently unveiled a new threat activity cluster, dubbed STAC6451, that is actively targeting organizations in India with Mimic ransomware. This group exploits... The post STAC6451: A Threat Group Targeting Indian Organizations with Mimic Ransomware appeared first on Cybersecurity News.

article thumbnail

2024 US Election Faces Escalating Iranian Cyber Influence, MTAC Warns

Penetration Testing

As the 2024 US presidential election approaches, the Microsoft Threat Analysis Center (MTAC) has reported a significant escalation in cyber-enabled influence operations originating from Iran. This marks the third consecutive... The post 2024 US Election Faces Escalating Iranian Cyber Influence, MTAC Warns appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!