Thu.Jan 23, 2025

article thumbnail

Chinese threat actors used two advanced exploit chains to hack Ivanti CSA

Security Affairs

US agencies revealed Chinese threat actors used two advanced exploit chains to breach Ivanti Cloud Service Appliances (CSA). The US governments cybersecurity and law enforcement revealed that Chinese threat actors used at least two sophisticated exploit chains to compromise Ivanti Cloud Service Appliances (CSA). A CISA and FBI published a joint advisory warning that Chinese hackers exploited four Ivanti flaws ( CVE-2024-8963 , CVE-2024-9379 , CVE-2024-8190 , CVE-2024-9380 ) to achieve remote cod

Hacking 116
article thumbnail

OT Cybersecurity and the Evolving Role of Controls Engineers

SecureWorld News

Industrial automation and operational technology (OT) are at a critical intersection where cybersecurity is not a "nice to have" but an essential component of system design and implementation. The expectations placed on control engineers have evolved significantly due to the growth in required customer requirements, stronger cybersecurity, and increasing complexity of OT environments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taking a Threat Adapted Approach to Vulnerability Management

Security Boulevard

As cyberthreats grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week ( December 9-13, 2024) which aimed to inform, share threat intelligence insights and best practices with our customers, partners and industry ecosystem, we held a session that.

article thumbnail

U.S. CISA adds JQuery flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds JQuery vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a JQuery persistent cross-site scripting (XSS) vulnerability, tracked as CVE-2020-11023 (CVSS score: 6.9) to its Known Exploited Vulnerabilities (KEV) catalog.

Hacking 97
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How SASE Empowers CISOs to Combat Stress and Burnout 

Security Boulevard

A study byISC2reveals that 73% of chief information security officers (CISOs) in the U.S. reported experiencing burnout over the past year. The post How SASE Empowers CISOs to Combat Stress and Burnout appeared first on Security Boulevard.

CISO 99
article thumbnail

GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams

Tech Republic Security

Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.

Scams 208

LifeWorks

More Trending

article thumbnail

Android enhances theft protection with Identity Check and expanded features

Google Security

Posted by Jianing Sandra Guo, Product Manager, Android, Nataliya Stanetsky, Staff Program Manager, Android Today, people around the world rely on their mobile devices to help them stay connected with friends and family, manage finances, keep track of healthcare information and more all from their fingertips. But a stolen device in the wrong hands can expose sensitive data, leaving you vulnerable to identity theft, financial fraud and privacy breaches.

article thumbnail

Cisco addresses a critical privilege escalation bug in Meeting Management

Security Affairs

Cisco addressed a critical flaw in its Meeting Management that could allow it to gain administrator privileges on vulnerable instances. Cisco released security updates to fix a critical flaw, tracked as CVE-2025-20156 (CVSS score of 9.9) affecting its Meeting Management. A remote, authenticated attacker can exploit the vulnerability to gain administrator privileges on affected instances.

article thumbnail

Phishing Emails Targeting Australian Firms Rise by 30% in 2024

Tech Republic Security

The number of phishing emails received by Australians surged by 30% last year, according to new research by Abnormal Security.

Phishing 167
article thumbnail

Pwn2Own Automotive 2025 Day 2: organizers awarded $335,500

Security Affairs

Bug hunters earned $129,000 for Tesla charger exploits and over $700,000 total in two days at Pwn2Own Automotive 2025. During Day 2 of Pwn2Own Automotive 2025 organizers awarded $335,500, which brings the event total to $718,250. So far, the researchers have demonstrated 39 unique zero-days. The team SinSinology leads the Master of Pwn chart. Day 2 of #Pwn2Own Automotive comes to a close.

Hacking 62
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CVE-2024-43468 (CVSS 9.8): Microsoft Configuration Manager Exploit Revealed with PoC Code

Penetration Testing

Security researcher Mehdi Elyassa from Synacktiv published the technical details and a proof-of-concept (PoC) exploit code for a The post CVE-2024-43468 (CVSS 9.8): Microsoft Configuration Manager Exploit Revealed with PoC Code appeared first on Cybersecurity News.

article thumbnail

Identity-Based Attacks Are Evolving. Duo Can Help

Duo's Security Blog

Over the last few years, identity-based attacks have become increasingly prevalent. This is in part due to the increasing complexity of identity and access management systems and their configurations and, in part, due to the rapidly evolving techniques employed by attackers. Identity-based incidents often begin with malicious actors gaining a first access foothold into a corporate environment.

article thumbnail

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

The Hacker News

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices' firmware as well as misconfigured security features. "These weren't obscure, corner-case vulnerabilities," security vendor Eclypsium said in a report shared with The Hacker News.

Firmware 141
article thumbnail

SOC vs MSSP: Which is Right for Your Business?

Centraleyes

One of the most pivotal decisions an organization faces is whether to build an in-house Security Operations Center (SOC) or outsource security operations to a Managed Security Service Provider (MSSP). While the choice may seem straightforward at first glance, the long-term implicationson finances, operations, and risk managementare anything but simple.

Risk 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

The Hacker News

Google has launched a new feature called Identity Check for supported Android devices that locks sensitive settings behind biometric authentication when outside of trusted locations.

article thumbnail

Subaru Security Flaws Exposed Its System for Tracking Millions of Cars

WIRED Threat Level

Now-fixed web bugs allowed hackers to remotely unlock and start millions of Subarus. More disturbingly, they could also access at least a year of cars location historiesand Subaru employees still can.

Hacking 124
article thumbnail

Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

The Hacker News

Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer.

article thumbnail

The iPad I bring with me everywhere is not the Pro or Air model

Zero Day

I wouldn't buy the latest iPad Mini for the AI features yet, but its ultraportability still reigns supreme among Apple's tablet lineup.

123
123
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features

The Hacker News

Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat actors linked to the infamous QakBot loader. "BackConnect is a common feature or module utilized by threat actors to maintain persistence and perform tasks," Walmart's Cyber Intelligence team told The Hacker News.

Malware 128
article thumbnail

How to retrieve a text message you lost or deleted on Android

Zero Day

If you've accidentally deleted important text messages (or if they've somehow disappeared), all hope is not lost.

122
122
article thumbnail

Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers

The Hacker News

Enterprise-grade Juniper Networks routers have become the target of a custom backdoor as part of a campaign dubbed J-magic. According to the Black Lotus Labs team at Lumen Technologies, the activity is so named for the fact that the backdoor continuously monitors for a "magic packet" sent by the threat actor in TCP traffic.

article thumbnail

The Open Weight Definition offers another take on the OSAID debate

Zero Day

This new framework from the Open Source Alliance aims to finally set the standard for open-source AI models. Will it?

122
122
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

The Hacker News

SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access (SMA) 1000 Series appliances that it said has been likely exploited in the wild as a zero-day. The vulnerability, tracked as CVE-2025-23006, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system.

Mobile 126
article thumbnail

The future of sales? These AI agents offer 24/7 ABC energy for SMBs

Zero Day

Imagine a sales team that never sleeps. Palona is launching AI chatbots designed to act as personable, 24/7 sales agents for businesses, going beyond simple customer service to drive sales and build brand loyalty.

122
122
article thumbnail

CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The medium-severity vulnerability is CVE-2020-11023 (CVSS score: 6.1/6.

article thumbnail

How to run a local LLM as a browser-based AI with this free extension

Zero Day

Ollama allows you to use a local LLM for your artificial intelligence needs, but by default, it is a command-line-only tool. To avoid having to use the terminal, try this extension instead.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

The Hacker News

An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective cybercrime entities are using identical code for their ransomware payloads. The findings come from SentinelOne, which analyzed artifacts uploaded to the VirusTotal malware scanning platform by the same submitter towards the end of December 2024.

article thumbnail

How to easily create a drop-down list in Excel (and simplify your data entry life)

Zero Day

Want to get better at Microsoft Excel? Here's a quick step-by-step guide to creating handy drop-down lists that save time, keep you organized, and simplify tedious data entry.

119
119
article thumbnail

PCI SSC’s Global Content Library Now Available on YouTube

PCI perspectives

ThePCI Security StandardsCouncil is excited to share that the PCI SSC Global Content Libraryis now available onYouTube!

Software 116
article thumbnail

This new framework aims to finally set the standard for open-source AI models

Zero Day

The Open Source Alliance unveils Open Weight Definition, bringing a new take to the open-source artificial intelligence definition debate.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!