Wed.Nov 06, 2024

article thumbnail

IoT Devices in Password-Spraying Botnet

Schneier on Security

Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part; the techniques seem basically what you get in a distributed password-guessing attack: “Any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale and greatly increase the likelihood of successful credential compromise and initial access to mul

Passwords 256
article thumbnail

Anton’s Alert Fatigue: The Study

Anton on Security

Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, to be sure, but there are some!) and ask him about alert fatigue — he would definitely understand what the concern is. Now, crank up your time machine all the way to 11 and fly to the 1970s where you can talk to some of the original NOC analysts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

Tech Republic Security

AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.

article thumbnail

Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’

Security Boulevard

That’s a lot of pain: $125,000 ransom seems small—but why do the scrotes want it paid in baguettes? The post Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’ appeared first on Security Boulevard.

Hacking 119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

Tech Republic Security

DNS hijacking is a growing threat that can redirect users to malicious sites. However, using passive DNS monitoring can help to protect data.

DNS 131
article thumbnail

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

The Hacker News

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure.

More Trending

article thumbnail

New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

The Hacker News

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.

article thumbnail

Google Cloud: MFA Will Be Mandatory for All Users in 2025

Security Boulevard

Google Cloud says it is taking a phased approach to making MFA mandatory for all users by the end of 2025 to help bolster the cyber-protections against increasingly sophisticated cyberattacks. The post Google Cloud: MFA Will Be Mandatory for All Users in 2025 appeared first on Security Boulevard.

Mobile 110
article thumbnail

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

The Hacker News

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi.

Malware 98
article thumbnail

CVE-2024-20418 (CVSS 10): Cisco URWB Access Points Vulnerable to Remote Takeover

Penetration Testing

In a critical security advisory, Cisco has disclosed a command injection vulnerability in its Unified Industrial Wireless Software used for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. Identified as CVE-2024-20418,... The post CVE-2024-20418 (CVSS 10): Cisco URWB Access Points Vulnerable to Remote Takeover appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Synology fixed critical flaw impacting millions of DiskStation and BeePhotos NAS devices

Security Affairs

Synology addressed a critical vulnerability in DiskStation and BeePhotos NAS devices that could lead to remote code execution. Taiwanese vendor Synology has addressed a critical security vulnerability, tracked as CVE-2024-10443, that impacts DiskStation and BeePhotos. An attacker can exploit the flaw without any user interaction and successful exploitation of this flaw could lead to remote code execution.

article thumbnail

Video: How Hackers Steal Your Cookies & How to Stop Them

eSecurity Planet

Cookies play a crucial role in enhancing your online experience, but they can also be exploited by cybercriminals to access sensitive information. In this video, our expert delves into what cookies are and their function in web browsing, explores the techniques hackers use to steal them — such as session hijacking and cross-site scripting (XSS) — and shares effective strategies and tools to protect your cookies and personal data in 2024.

article thumbnail

The best open-source AI models: All your free-to-use options explained

Zero Day

Here are the best open-source and free-to-use AI models for text, images, and audio, organized by type, application, and licensing considerations.

142
142
article thumbnail

How to Effectively Manage a Data Breach

Tech Republic Security

Data breaches are a security nightmare that most CISOs will face at some point in their careers. While most data breaches are not recoverable, security teams can still reduce the impact and limit the damage. Avya Chaudhary, writing for TechRepublic Premium, explains what a data breach actually is, how it can affect your organization, and.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns

The Hacker News

The Canadian government on Wednesday ordered ByteDance-owned TikTok to dissolve its operations in the country, citing national security risks, but stopped short of instituting a ban on the popular video-sharing platform.

article thumbnail

VEILDrive: A Novel Attack Exploits Microsoft Services for Command & Control

Penetration Testing

The cybersecurity team at Hunters, AXON, recently uncovered an ongoing threat campaign called VEILDrive that leverages Microsoft services for command and control (C2). Utilizing Microsoft’s SaaS suite—including Teams, OneDrive, SharePoint,... The post VEILDrive: A Novel Attack Exploits Microsoft Services for Command & Control appeared first on Cybersecurity News.

article thumbnail

Columbus Ransomware Attack Exposes 500,000+ Residents’ Data: How to Stay Safe

eSecurity Planet

In a stunning blow to the city’s cybersecurity defenses, Columbus, Ohio, recently became the target of a massive cyberattack that exposed over half a million residents’ sensitive information. Following a July 18 attack by the Rhysida ransomware group — believed to have Russian affiliations — Columbus is still reeling from the exposure of vast amounts of sensitive resident data.

article thumbnail

This 13-inch laptop I recommend for business travel is not a Lenovo ThinkPad or MacBook

Zero Day

Lenovo's ThinkBook 13x Gen 4 has a lightweight and durable form factor - and a Magic Bay accessory that I can't stop thinking about.

98
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Heimdal and COOLSPIRiT Team Up to Strengthen UK Business Cybersecurity

Heimadal Security

LONDON, United Kingdom, 6 November 2024 – Heimdal, a leading provider of advanced cybersecurity solutions, and COOLSPIRiT, a UK-based expert in data management and IT infrastructure, are pleased to announce a strategic partnership to deliver cutting-edge security technologies to businesses across the UK. Today’s organizations face sophisticated cyber threats targeting critical systems and data.

article thumbnail

Securing SMBs in a Cloud-Driven World: Best Practices for Cost-Effective Digital Hygiene Through Verified Authentication

Security Boulevard

Hackers are acutely aware that basic corporate account credentials present a significant vulnerability, increasing the stakes for SMBs in particular. The post Securing SMBs in a Cloud-Driven World: Best Practices for Cost-Effective Digital Hygiene Through Verified Authentication appeared first on Security Boulevard.

article thumbnail

Memorial Hospital and Manor suffered a ransomware attack

Security Affairs

Georgia, a ransomware attack disrupted Memorial Hospital and Manor’s access to its Electronic Health Record system. A ransomware attack hit Memorial Hospital and Manor in Bainbridge, Georgia, and disrupted the access to its Electronic Health Record system. Memorial Hospital and Manor is a community hospital and healthcare facility that serves Decatur County and surrounding areas in southwest Georgia.

article thumbnail

The Thunderbird email client finally landed on Android, and it was worth the wait

Zero Day

It's been years in the making, but the Thunderbird developers have finally brought the open-source email client to Android.

132
132
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

CVE-2024-42509 (CVSS 9.8): Critical Vulnerability Exposes Aruba Access Points to Attack

Penetration Testing

HPE Aruba Networking has issued a security advisory warning of multiple critical vulnerabilities affecting Access Points running Instant AOS-8 and AOS-10. The company has released patches addressing these vulnerabilities, which,... The post CVE-2024-42509 (CVSS 9.8): Critical Vulnerability Exposes Aruba Access Points to Attack appeared first on Cybersecurity News.

article thumbnail

9 Steps to Get CTEM on Your 2025 Budgetary Radar

The Hacker News

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical.

article thumbnail

Business in the age of AI: From economies of scale to ecosystems of success

Zero Day

With neither infrastructure nor silos to slow it down, World Central Kitchen delivers a million meals a day, every day. It also delivers important lessons for your business.

119
119
article thumbnail

New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency

SecureList

Introduction In August 2024, our team identified a new crimeware bundle, which we named “SteelFox” Delivered via sophisticated execution chains including shellcoding, this threat abuses Windows services and drivers. It spreads via forums posts, torrent trackers and blogs, imitating popular software like Foxit PDF Editor and AutoCAD. It also uses stealer malware to extract the victim’s credit card data as well as details about the infected device.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

APT36 Advances with ElizaRAT and ApoloStealer: New Tactics in Espionage Against India

Penetration Testing

In a new report, cybersecurity researchers from Check Point detail the evolution of ElizaRAT, a remote access tool (RAT) used by the notorious APT36, also known as Transparent Tribe. The... The post APT36 Advances with ElizaRAT and ApoloStealer: New Tactics in Espionage Against India appeared first on Cybersecurity News.

article thumbnail

INTERPOL: Operation Synergia II disrupted +22,000 malicious IPs

Security Affairs

A global law enforcement operation called Operation Synergia II dismantled over 22,000 malicious IPs linked to phishing, infostealers, and ransomware, INTERPOL said. INTERPOL announced this week it took down more than 22,000 malicious servers linked to cybercriminal activities as part of a global operation code-named Operation Synergia II. Operation Synergia II is a collaborative effort by INTERPOL, private sector partners, and 95 countries, that targeted phishing, ransomware, and infostealers f

article thumbnail

Better than Ring? This video doorbell has similar features and none of the monthly fees

Zero Day

The Lorex 2K video doorbell is the brand's flagship security system, and it's well worth the upfront cost.

98
article thumbnail

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

The Hacker News

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.