Mon.Nov 18, 2024

article thumbnail

Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days

Schneier on Security

Zero-day vulnerabilities are more commonly used , according to the Five Eyes: Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were explo

article thumbnail

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Security Affairs

T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it was hacked as part of a long-running cyber espionage campaign targeting Telco companies. Recently, the FBI and CISA announced they are continuing to investigate a large-scale cyber-espionage campaign by China-linked threat actors targeting U.S. telecoms, compromising networks to steal call records and access private communications, mainly of governme

Mobile 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report Unveils Cybersecurity Leaks in U.S. Drinking Water Systems

SecureWorld News

A recent report from the U.S. Environmental Protection Agency (EPA) Office of Inspector General (OIG) has highlighted significant cybersecurity vulnerabilities in the nation's drinking water systems. The report, released on November 13, 2024, underscores the urgent need for increased security measures to protect critical infrastructure. The report examines drinking water systems with populations serving 50,000 people or more.

article thumbnail

Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals

Security Affairs

A ransomware attack on Great Plains Regional Medical Center compromised personal data of 133,000 individuals, exposing sensitive information. On September 8, 2024, Great Plains Regional Medical Center (Oklahoma) suffered a ransomware attack. The organization launched an investigation into the incident with the help of a cybersecurity firm. The healthcare center discovered that a threat actor accessed and encrypted files on their systems between September 5, 2024 and September 8, 2024.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

North Korean Hackers Target Job Seekers with Malware-Laced Video Apps

Penetration Testing

A recent report by Unit 42 researchers uncovers a complex phishing campaign linked to a cluster of North Korean IT workers tracked as CL-STA-0237. This group used malware-infected video conference... The post North Korean Hackers Target Job Seekers with Malware-Laced Video Apps appeared first on Cybersecurity News.

Malware 116
article thumbnail

Fraud Network Operates 4,700 Fake Shopping Sites to Steal Credit Card Data

ZoneAlarm

Cybersecurity researchers have exposed a global fraud network known as “SilkSpecter,” responsible for operating 4,700 fake shopping websites to steal credit card details. This sophisticated phishing campaign used professional designs and search engine manipulation to target unsuspecting shoppers worldwide. The SilkSpecter network orchestrated a massive operation involving thousands of fake e-commerce sites.

LifeWorks

More Trending

article thumbnail

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Security Boulevard

Hold on, let’s guess. You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of. The post Cloud Pentesting 101: What to Expect from a Cloud Penetration Test appeared first on Strobes Security. The post Cloud Pentesting 101: What to Expect from a Cloud Penetration Test appeared first on Security Boulevard.

article thumbnail

Trio of Apache Tomcat Flaws Disclosed: Authentication Bypass, HTTP/2 Request Mix-Up, and XSS Flaw

Penetration Testing

The Apache Software Foundation has recently disclosed three new vulnerabilities affecting Apache Tomcat, a widely-used open-source web server and servlet container. These vulnerabilities, ranging from authentication bypass to potential cross-site... The post Trio of Apache Tomcat Flaws Disclosed: Authentication Bypass, HTTP/2 Request Mix-Up, and XSS Flaw appeared first on Cybersecurity News.

article thumbnail

Coffee with the Council Podcast: Scoping and Segmentation: Navigating Modern Network Architecture and PCI DSS v4.x

PCI perspectives

Welcome to our podcast series, Coffee with the Council. I'm Alicia Malone, Senior Manager of Public Relations for the PCI Security Standards Council. Recently, PCI SSC published a new information supplement called PCI DSS Scoping and Segmentation Guidance for Modern Network Architectures. This document was produced by the 2023 Special Interest Group, also called a SIG, who spent a year collaborating on this project, which was led by the Council's own Kandyce Young, Manager of Data Security Stand

article thumbnail

CVE-2024-0012 and CVE-2024-9474: Actively Exploited Vulnerabilities Impact Palo Alto Networks PAN-OS

Penetration Testing

Palo Alto Networks has issued critical advisories regarding two actively exploited vulnerabilities in their PAN-OS software, posing significant risks to organizations relying on the platform for network security. These flaws,... The post CVE-2024-0012 and CVE-2024-9474: Actively Exploited Vulnerabilities Impact Palo Alto Networks PAN-OS appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Barracuda Networks Report Sees Sextortion Becoming More Personalized

Security Boulevard

A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased. The post Barracuda Networks Report Sees Sextortion Becoming More Personalized appeared first on Security Boulevard.

article thumbnail

Foreign adversary hacked email communications of the Library of Congress says

Security Affairs

The Library of Congress discloses the compromise of some of its IT systems, an alleged foreign threat actor hacked their emails. The Library of Congress informed lawmakers about a security breach, an alleged foreign adversary compromised some of their IT systems and gained access to email communications between congressional offices and some library staff, including the Congressional Research Service.

Hacking 66
article thumbnail

Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella

Trend Micro

LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals.

Malware 140
article thumbnail

Recently disclosed VMware vCenter Server bugs are actively exploited in attacks

Security Affairs

Threat actors are actively exploiting two VMware vCenter Server vulnerabilities tracked as CVE-2024-38812 and CVE-2024-38813, Broadcom warns. Broadcom warns that the two VMware vCenter Server vulnerabilities CVE-2024-38812 and CVE-2024-38813 are actively exploited in the wild. “Updated advisory to note that VMware by Broadcom confirmed that exploitation has occurred in the wild for CVE-2024-38812 and CVE-2024-38813.” reads the advisory. vCenter Server is a critical component in VMwar

Hacking 64
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Software Liability Comes to the EU: Navigating New Compliance Challenges

Veracode Security

The European Union has taken a significant step by introducing a directive to update the EU’s civil liability law that extends the definition of "defective products" to include software. These pivotal liability rules hold manufacturers accountable for harm caused by software vulnerabilities, urging them to prioritize cybersecurity and compliance. Here’s how manufactures should think about navigating these new compliance challenges.

article thumbnail

How Cloud Monitor Helps Centennial School District Combat Account Takeovers

Security Boulevard

In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 technology staff can use to prepare for hidden digital threats. Our guest speakers Sal Franco, IT Director at Buckeye Elementary, and Fran Watkins, Technology Manager at Centennial School District, shared their first-hand stories with ransomware and data loss.

article thumbnail

Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign

The Hacker News

U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information. The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets.

Mobile 137
article thumbnail

LibreNMS Vulnerability (CVE-2024-51092): Mitigating the Risk of Server Compromise

Penetration Testing

A recent security advisory from the LibreNMS project has revealed a severe vulnerability (CVE-2024-51092) affecting versions up to 24.9.1 of the widely-used network monitoring platform. The flaw, rated a critical... The post LibreNMS Vulnerability (CVE-2024-51092): Mitigating the Risk of Server Compromise appeared first on Cybersecurity News.

Risk 131
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information

The Hacker News

A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate brands with the goal of stealing their personal information ahead of the Black Friday shopping season. "The campaign leveraged the heightened online shopping activity in November, the peak season for Black Friday discounts.

Phishing 133
article thumbnail

How to create a podcast with AI in seconds: Easy, step-by-step instructions

Zero Day

Using PDFs, text files, or audio files, Google's NotebookLM tool can generate a podcast episode that sounds just like two real people discussing your topic. We'll walk you through exactly how it's done.

126
126
article thumbnail

Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy

The Hacker News

Google appears to be readying a new feature called Shielded Email that allows users to create email aliases when signing up for online services and better combat spam. The feature was first reported by Android Authority last week following a teardown of the latest version of Google Play Services for Android.

126
126
article thumbnail

An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data (Lock and Code S05E24)

Malwarebytes

This week on the Lock and Code podcast… The month, a consumer rights group out of the UK posed a question to the public that they’d likely never considered: Were their air fryers spying on them? By analyzing the associated Android apps for three separate air fryer models from three different companies, a group of researchers learned that these kitchen devices didn’t just promise to make crispier mozzarella sticks, crunchier chicken wings, and flakier reheated pastries—they also wanted a lot of u

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws

The Hacker News

Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

My favorite tablet for watching movies is not an iPad or Samsung Galaxy Tab

Zero Day

The OnePlus Pad 2 is a solid entertainment tablet with good hardware, a long-lasting battery, and most importantly: a brilliant display.

111
111
article thumbnail

New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers

The Hacker News

Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed in the wild delivering information stealer families such as WhiteSnake and Meduza.

Malware 114
article thumbnail

What is “Scam Likely”? Putting the phone down on unwanted calls

We Live Security

Tired of dodging all those 'Scam Likely' calls? Here's what’s behind the label and how to stay one step ahead of phone scammers.

Scams 109
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Gen AI could speed up coding, but businesses should still consider risks

Zero Day

Organizations keen to fund gen AI-powered software development for the anticipated benefits should also understand that this may come with adverse effects.

Risk 108
article thumbnail

Beyond Compliance: The Advantage of Year-Round Network Pen Testing

The Hacker News

IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad guys out. But here’s the thing: hackers don’t wait around for compliance schedules.

article thumbnail

The iPad Mini 7 is almost perfect for me - except its missing one critical feature

Zero Day

Apple's latest iPad Mini 7, powered by the A17 Pro chip, is an incredibly capable tablet, but it missed one big opportunity.

108
108
article thumbnail

Guarding Your Brand: Why Domain Protection is Essential for Every Business Owner

Security Boulevard

Protect your business with domain protection. Learn how it prevents cyberattacks, phishing, and data breaches while keeping your personal information secure. The post Guarding Your Brand: Why Domain Protection is Essential for Every Business Owner appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!