Sat.Oct 19, 2024

article thumbnail

North Korea-linked APT37 exploited IE zero-day in a recent attack

Security Affairs

North Korea-linked group APT37 exploited an Internet Explorer zero-day vulnerability in a supply chain attack. A North Korea-linked threat actor, tracked as APT37 (also known as RedEyes, TA-RedAnt, Reaper, ScarCruft , Group123 ), exploited a recent Internet Explorer zero-day vulnerability, tracked as CVE-2024-38178 (CVSS score 7.5), in a supply chain attack.

Internet 113
article thumbnail

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

The Hacker News

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Veeam Backup and Replication vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Veeam Backup and Replication flaw CVE-2024-40711 (CVSS score of 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

Backups 111
article thumbnail

Grab a Microsoft Office Pro and Windows 11 Pro bundle for 87% off

Zero Day

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $53 for a limited time.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Acronym Overdose – Navigating the Complex Data Security Landscape

The Hacker News

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy.

article thumbnail

Beware of Fake Google Meet Invites: ClickFix Campaign Spreading Infostealers

Penetration Testing

A new and dangerous social engineering tactic, dubbed ClickFix, has emerged as a significant cybersecurity threat in 2024, according to a recent report from the Sekoia Threat Detection & Research... The post Beware of Fake Google Meet Invites: ClickFix Campaign Spreading Infostealers appeared first on Cybersecurity News.

More Trending

article thumbnail

USENIX NSDI ’24 – Crescent: Emulating Heterogeneous Production Network at Scale

Security Boulevard

Authors/Presenters:Zhaoyu Gao, Anubhavnidhi Abhashkumar, Zhen Sun, Weirong Jiang, Yi Wang Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara ; and via the organizations YouTube channel.

64
article thumbnail

This Acer laptop is my go-to recommendation for budget shoppers (and it's on sale)

Zero Day

Acer's Aspire Go 15 is well-optimized for everyday workloads and is the latest addition to the company's great line of budget laptops. The device is even cheaper on Amazon, as it's currently on sale for $260.

75
article thumbnail

USENIX NSDI ’24 – A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network

Security Boulevard

Authors/Presenters:Nils Blach, Maciej Besta, Daniele De Sensi, Jens Domke, Hussein Harake, Shigang Li, Patrick Iff, Marek Konieczny, Kartik Lakhotia, Ales Kubicek, Marcel Ferrari, Fabrizio Petrini, Torsten Hoefler Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

64
article thumbnail

Get a BJ's membership for $20, and get a free $20 gift card - here's how

Zero Day

Get an annual BJ's Wholesale Club membership for 63% off right now, and get a $20 gift card in return, to save on groceries, gas, household items, and more.

75
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Vulnhuntr: A Tool for Finding Exploitable Vulnerabilities with LLMs and Static Code Analysis

Penetration Testing

In today’s ever-evolving cybersecurity landscape, identifying vulnerabilities in codebases is critical for maintaining secure software and infrastructure. Vulnhuntr, an open-source tool available on GitHub, leverages Large Language Models (LLMs) and... The post Vulnhuntr: A Tool for Finding Exploitable Vulnerabilities with LLMs and Static Code Analysis appeared first on Cybersecurity News.

article thumbnail

Are Cybersecurity Jobs in High Demand?

Hacker's King

In today’s increasingly digital world, businesses, governments, and individuals face an ever-growing threat from cyberattacks. Cybersecurity has become one of the most critical fields in technology, ensuring that data, networks, and systems are protected from unauthorized access and malicious attacks. As cyber threats escalate, the demand for skilled professionals in cybersecurity is skyrocketing.

article thumbnail

Changing these 5 TV settings can instantly improve its picture quality - here's how

Zero Day

With a bit of patience and experimentation, you can tweak your TV's basic settings for crisper images and a better viewing experience.

75
article thumbnail

CVE-2024-10025 (CVSS 9.1): Critical Flaw in SICK Products Exposes Systems to Remote Attacks

Penetration Testing

A newly disclosed vulnerability in multiple SICK products, tracked as CVE-2024-10025, has raised significant cybersecurity concerns across industries relying on the company’s automation and sensor technologies. The vulnerability, classified as... The post CVE-2024-10025 (CVSS 9.1): Critical Flaw in SICK Products Exposes Systems to Remote Attacks appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

One of the best soundbars I've tested is not made by Sonos or Bose (and it's $200 off)

Zero Day

The LG S95TR soundbar delivers immersive audio quality and has unique features that you'll actually want to use. It is currently $200 off on LG's online store.

75
article thumbnail

I highly recommend this 12-in-1 electric screwdriver, and it's on sale at Amazon

Zero Day

This top-rated electric screwdriver has served me well for over a year. And you can buy the Hoto Rechargeable Electric Screwdriver for about $42 on Amazon.

75
article thumbnail

You can turn your old Android phone into a ham radio - here's how

Zero Day

Unfortunately it's a little bit more involved than downloading an app.

76