Fri.Oct 20, 2023

article thumbnail

Hackers Stole Access Tokens from Okta’s Support Unit

Krebs on Security

Okta , a company that provides identity tools like multi-factor authentication and single sign-on to thousands of businesses, has suffered a security breach involving a compromise of its customer support unit, KrebsOnSecurity has learned. Okta says the incident affected a “very small number” of customers, however it appears the hackers responsible had access to Okta’s support platform for at least two weeks before the company fully contained the intrusion.

article thumbnail

NordVPN vs. ExpressVPN: Which VPN Is Best for 2023?

Tech Republic Security

NordVPN or ExpressVPN? Read this in-depth comparison to find out which VPN provider comes out on top in terms of features, security, speed, and more.

VPN 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds Cisco IOS XE flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the vulnerability CVE-2021-1435 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability CVE-2021-1435 in Cisco IOS XE. The vulnerability is a command injection vulnerability in the web user interface that could allow a remote, authenticated attacker to inject commands that can be executed as the root user.

article thumbnail

Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of Devices

The Hacker News

Cisco has warned of a new zero-day flaw in IOS XE that has been actively exploited by an unknown threat actor to deploy a malicious Lua-based implant on susceptible devices. Tracked as CVE-2023-20273 (CVSS score: 7.2), the issue relates to a privilege escalation flaw in the web UI feature and is said to have been used alongside CVE-2023-20198 as part of an exploit chain.

135
135
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Tens of thousands Cisco IOS XE devices were hacked by exploiting CVE-2023-20198

Security Affairs

More than 40,000 Cisco IOS XE devices have been compromised in attacks exploiting recently disclosed critical vulnerability CVE-2023-20198. Researchers from LeakIX used the indicators of compromise (IOCs) released by Cisco Talos and found around 30k Cisco IOS XE devices (routers, switches, VPNs) that were infected by exploiting the CVE-2023-20198. Most of the infected devices were in the United States, the Philippines, Chile, and Mexico.

Hacking 138
article thumbnail

Malvertisers Using Google Ads to Target Users Searching for Popular Software

The Hacker News

Details have emerged about a malvertising campaign that leverages Google Ads to direct users searching for popular software to fictitious landing pages and distribute next-stage payloads. Malwarebytes, which discovered the activity, said it's "unique in its way to fingerprint users and distribute time sensitive payloads.

Software 133

More Trending

article thumbnail

Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover

Dark Reading

SolarWinds' access controls contain five high and three critical-severity security vulnerabilities that need to be patched yesterday.

131
131
article thumbnail

Critical RCE flaws found in SolarWinds access audit solution

Bleeping Computer

Security researchers found three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product that remote attackers could use to run code with SYSTEM privileges. [.

130
130
article thumbnail

EU Authorities Deal Blow to RagnarLocker Ransomware Operations

Security Boulevard

Law enforcement agencies throughout Europe and the United States took a big swing at the notorious RagnaLocker ransomware group, arresting a malware developer, seizing parts of its infrastructure, and shutting down negotiations and leak sites on the Tor network. During the operation, which stretched over the last four days and multiple European countries, authorities also.

article thumbnail

Cisco discloses new IOS XE zero-day exploited to deploy malware implant

Bleeping Computer

Cisco disclosed a new high-severity zero-day (CVE-2023-20273) today, actively exploited to deploy malicious implants on IOS XE devices compromised using the CVE-2023-20198 zero-day unveiled earlier this week. [.

Malware 129
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges

The Hacker News

A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various off-the-shelf malware designed to capture sensitive data from compromised Windows systems.

article thumbnail

Okta says its support system was breached using stolen credentials

Bleeping Computer

​Okta says attackers accessed files containing cookies and session tokens uploaded by customers to its support management system after breaching it using stolen credentials. [.

125
125
article thumbnail

Vietnamese Hackers Target U.K., U.S., and India with DarkGate Malware

The Hacker News

Attacks leveraging the DarkGate commodity malware targeting entities in the U.K., the U.S., and India have been linked to Vietnamese actors associated with the use of the infamous Ducktail stealer. "The overlap of tools and campaigns is very likely due to the effects of a cybercrime marketplace," WithSecure said in a report published today.

Malware 119
article thumbnail

9 Innovative Ways to Boost Security Hygiene for Cyber Awareness Month

Dark Reading

If we really want to move the dial on security habits, it's time to think beyond phishing tests. Our panel of CISOs and other security heavy-hitters offer expert tips that go beyond the obvious.

CISO 116
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Behind the Breach: Cross-tenant Impersonation in Okta

Security Boulevard

In recent investigations, the Obsidian Threat Research team has observed multiple instances of cross-tenant impersonation used to establish persistence and escalate user privileges within Okta environments. This technique poses a significant risk to organizations that rely on Okta for identity management, as it allows attackers to access and impersonate any legitimate user, accessing critical systems […] The post Behind the Breach: Cross-tenant Impersonation in Okta appeared first on Obsidian Se

Risk 115
article thumbnail

Unleashing the Power of the Internet of Things and Cyber Security

The Hacker News

Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business is conducted around the world. This advancement and the power of the IoT have been nothing short of transformational in making data-driven decisions, accelerating efficiencies, and streamlining operations to meet the demands of a competitive global marketplace.

Internet 113
article thumbnail

Cisco Finds New Zero Day Bug, Pledges Patches in Days

Dark Reading

A patch for the max severity zero-day bug tracked as CVE-2023-20198 is coming soon, but the bug has already led to the compromise of tens of thousands of Cisco devices. And now, there's a new unpatched threat.

112
112
article thumbnail

What Can Enterprises Learn from the MOVEit Hack?

GlobalSign

The ramifications of the MOVEit hack were felt globally. Find out how your business can defend against similar attacks with encryption and automation.

Hacking 111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ragnar Locker ransomware group taken down

Malwarebytes

Even though it had a long run for a ransomware group, it seems the bell might be tolling for Ragnar Locker. On October 19, 2023, the group’s leak site was seized by an international group of law enforcement agencies. The take down action was carried out between 16 and 20 October. During the action searches were conducted in Czechia, Spain and Latvia.

article thumbnail

CompTIA Security+ 601 vs. 701: What’s the Difference

CompTIA on Cybersecurity

CompTIA Security+ ranks among the top 10 cybersecurity certifications in 2023. See how CompTIA Security+ (SY0-701) compares to SY0-601.

article thumbnail

More Okta Customers Hacked

Dark Reading

Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users.

Hacking 105
article thumbnail

News alert: AI-powered web scrapers from Oxylabs are breaking new ground in fraud detection

The Last Watchdog

Vilnius, Lithuania, Oct. 20, 2023 — The UN Office on Drugs and Crime estimates that 5% of global GDP (£1.6 trillion) is laundered yearly , with increasing volumes of online data and the digitization of the economy making fraudsters more creative and difficult to catch. “Enterprises in the finance, banking, and telecommunications sectors are the most susceptible to online fraud, but it can happen to any company,” said Vaidotas Sedys , Head of Risk Management at Oxylabs.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

What Is Hybrid Cloud Security? How it Works & Best Practices

eSecurity Planet

Hybrid cloud security is a framework for protecting data and applications in a computing environment that includes both private and public clouds. It combines on-premises and cloud-based resources to satisfy an organization’s diversified computing demands while ensuring strong security. This approach to cloud computing enables enterprises to benefit from the scalability and flexibility provided by public clouds while maintaining sensitive data within their own infrastructure.

Backups 99
article thumbnail

Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors

Dark Reading

Vietnamese cybercrime groups are using multiple different MaaS infostealers and RATs to target the digital marketing sector.

article thumbnail

Fake Corsair job offers on LinkedIn push DarkGate malware

Bleeping Computer

A threat actor is using fake LinkedIn posts and direct messages about a Facebook Ads specialist position at hardware maker Corsair to lure people into downloading info-stealing malware like DarkGate and RedLine. [.

Malware 98
article thumbnail

DoD Gets Closer to Nominating Cyber Policy Chief

Dark Reading

Though there is speculation regarding potential candidates, the Department of Defense will likely not nominate someone in the near term.

97
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Best Patch Management Software & Tools 2023

Heimadal Security

Choosing the best patch management tool boils down to what your organization needs. Consider how complex your IT setup is and how much you’re willing to spend. For instance, large companies with diverse operating systems and applications will need a more powerful and scalable patch management solution. Imagine trying to manually update hundreds of devices […] The post Best Patch Management Software & Tools 2023 appeared first on Heimdal Security Blog.

article thumbnail

Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid

Dark Reading

To make cybersecurity an organizationwide priority, CISOs must avoid these common input, empathy, and alignment obstacles.

CISO 95
article thumbnail

Thousands of Cisco IOS XE Devices Compromised Due to Zero-Day Vulnerability

Heimadal Security

Over 40,000 Cisco devices running the IOS XE operating system have been compromised after threat actors exploited a recently disclosed vulnerability, tracked as CVE-2023-20198. At the time of writing this article, there is neither a fix nor a solution for the issue, so the customers are only advised to “disable the HTTP Server feature on […] The post Thousands of Cisco IOS XE Devices Compromised Due to Zero-Day Vulnerability appeared first on Heimdal Security Blog.

article thumbnail

From Snooze to Enthuse: Making Security Awareness Training 'Sticky'

Dark Reading

Most companies offer some kind of awareness training these days. But how much of those lessons are employees actually retaining?

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.