Thu.Oct 17, 2024

article thumbnail

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Tech Republic Security

Attackers launched 600 million cybercriminal and nation-state threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant.

article thumbnail

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

The Hacker News

Microsoft has disclosed details about a now-patched security flaw in Apple's Transparency, Consent, and Control (TCC) framework in macOS that has likely come under exploitation to get around a user's privacy preferences and access data. The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133.

122
122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIS 2 Compliance Deadline Arrives: What You Need to Know

Tech Republic Security

The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now.

article thumbnail

Hackers Turn to AI as Hardware Attacks Surge

Security Boulevard

There has been a sharp increase in the perceived value of AI technologies in hacking, according to a report from Bugcrowd platform, which surveyed 1,300 ethical hackers and security researchers. The post Hackers Turn to AI as Hardware Attacks Surge appeared first on Security Boulevard.

Hacking 114
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Number of Active Ransomware Groups Highest on Record, Cyberint’s Report Finds

Tech Republic Security

This indicates that the most prominent ransomware groups are succumbing to law enforcement takedowns, according to researchers from Cyberint.

article thumbnail

Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

The Hacker News

Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group's affiliate panel on the dark web.

More Trending

article thumbnail

This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

WIRED Threat Level

Security researchers created an algorithm that turns a malicious prompt into a set of hidden instructions that could send a user's personal information to an attacker.

Hacking 104
article thumbnail

A critical flaw in Kubernetes Image Builder could allow attackers to gain root access

Security Affairs

A critical flaw in Kubernetes Image Builder could allow attackers to gain root access if exploited under specific conditions. A critical, Kubernetes Image Builder vulnerability, tracked as CVE-2024-9486 (CVSS score: 9.8), could allow attackers to gain root access if exploited under specific conditions. Only Kubernetes clusters with nodes using VM images from the Image Builder project and its Proxmox provider are impacted by this issue. “A security issue was discovered in the Kubernetes I

article thumbnail

10 steps to safeguarding your privacy online

Webroot

The more devices, digital apps and online accounts you use, the more efficient and convenient your life becomes. But all that ease of use comes with a price. Your devices are constantly collecting your personal data to fine-tune your user experience. At the same time, hackers, and other cyber criminals are working round the clock to steal this sensitive information.

VPN 99
article thumbnail

Patch Now! Grafana Hit by 9.9 Severity RCE Vulnerability (CVE-2024-9264)

Penetration Testing

A critical security vulnerability (CVE-2024-9264) has been discovered in Grafana, the popular open-source platform for monitoring and observability. This vulnerability, with a CVSS v3.1 score of 9.9, could allow attackers... The post Patch Now! Grafana Hit by 9.9 Severity RCE Vulnerability (CVE-2024-9264) appeared first on Cybersecurity News.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Russia-linked RomCom group targeted Ukrainian government agencies since late 2023

Security Affairs

Russia-linked threat actor RomCom targeted Ukrainian government agencies and Polish entities in cyber attacks since late 2023. Cisco Talos researchers observed Russia-linked threat actor RomCom (aka UAT-5647 , Storm-0978 , Tropical Scorpius , UAC-0180, UNC2596 ) targeting Ukrainian government agencies and Polish entities in a new wave of attacks since at least late 2023.

article thumbnail

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

The Hacker News

The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper (aka SnipBot or RomCom 5.0), said Cisco Talos, which is monitoring the activity cluster under the moniker UAT-5647.

article thumbnail

Vendor Comparison: DIY Home Security Systems

Tech Republic Security

Attention remote workers! When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide, created by Mark W. Kaelin for TechRepublic Premium, provides advice you can follow as you make decisions regarding how you will deploy a home security system. The accompanying.

82
article thumbnail

SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

The Hacker News

An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked as SideWinder, which is also known as APT-C-17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger, and T-APT-04.

94
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

HM Surf (CVE-2024-44133): macOS Flaw Exposing Cameras and Microphones to Hackers, PoC Published

Penetration Testing

In a significant discovery by Microsoft Threat Intelligence, a vulnerability in macOS, identified as CVE-2024-44133, has been found to bypass Apple’s Transparency, Consent, and Control (TCC) technology. This flaw, dubbed... The post HM Surf (CVE-2024-44133): macOS Flaw Exposing Cameras and Microphones to Hackers, PoC Published appeared first on Cybersecurity News.

article thumbnail

The top 5 iPhone 16 Pro features power users will love

Zero Day

Apple's iPhone 16 series ushers in significant updates to both software and hardware. Here are the features that pro users will care about the most.

article thumbnail

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

NSTIC

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity.

article thumbnail

Two Sudanese nationals indicted for operating the Anonymous Sudan group

Security Affairs

The DoJ charged Anonymous Sudan members and disrupted their DDoS infrastructure, halting its cyber operations. The US Justice Department charged two Sudanese brothers (Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27) with operating and controlling the cybercrime collective Anonymous Sudan that launched tens of thousands of Distributed Denial of Service (DDoS) attacks against critical infrastructure, corporate networks, and government agencies in the United States and around the world

DDOS 84
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

'ConfusedPilot' Manipulates AI Tools, Exploiting Cloud Security Flaws

SecureWorld News

Researchers at the Spark Research Lab at the University of Texas at Austin have uncovered a new cyberattack method named ConfusedPilot , which has significant implications for cloud and data security. Led by Symmetry Systems CEO and professor Mohit Tiwari , the team identified the novel attack strategy , which exploits weaknesses in modern cloud infrastructure to manipulate authentication and access control systems.

article thumbnail

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security

Security Boulevard

The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies like AI, quantum computing, and the Internet of Things. The post World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security appeared first on Security Boulevard.

article thumbnail

These bone-conducting headphones deliver the best sound - and a cool trick for swimmers

Zero Day

The H20 Tri headphones are perfect for outdoor activities - and they deliver actual bass! Plus: You can leave your phone at home and still listen to your music on the go.

85
article thumbnail

Ransomware Payouts Decline as Security Maturity Rises

Security Boulevard

There has been a sharp decline in ransomware payouts, with only 11% of companies admitting to paying demands, which has been attributed to increased investment in backup and recovery technologies. The post Ransomware Payouts Decline as Security Maturity Rises appeared first on Security Boulevard.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Cisco ATA 190 Series Analog Telephone Adapter Firmware Flaws Exposed: Patch Now!

Penetration Testing

Cisco has recently disclosed a series of high-severity vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter firmware, including both on-premises and multiplatform variants. These vulnerabilities present a significant... The post Cisco ATA 190 Series Analog Telephone Adapter Firmware Flaws Exposed: Patch Now! appeared first on Cybersecurity News.

article thumbnail

Are You Prepared for Ransomware IRL?

Security Boulevard

The post Are You Prepared for Ransomware IRL? appeared first on Digital Defense. The post Are You Prepared for Ransomware IRL? appeared first on Security Boulevard.

article thumbnail

F5 BIG-IP Vulnerability (CVE-2024-45844): Access Control Bypass Risk, PoC Available

Penetration Testing

A critical vulnerability has been identified in F5 BIG-IP, a popular network traffic management and security solution. The vulnerability, tracked as CVE-2024-45844 and assigned a CVSSv4 score of 8.6 (High),... The post F5 BIG-IP Vulnerability (CVE-2024-45844): Access Control Bypass Risk, PoC Available appeared first on Cybersecurity News.

Risk 70
article thumbnail

8 reasons to avoid the latest Windows 11 update (hint: they're all bugs)

Zero Day

Microsoft's official 24H2 update for Windows 11 is saddled with a bunch of annoying and disruptive bugs. Here's what you may encounter if you jump to the new version right now.

76
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Largest DDoS Cloudflare Attack On Global Sectors Mitigated

Security Boulevard

As per recent media reports, Cloudflare has successfully disclosed the mitigation of a record-breaking distributed denial-of-service (DDoS) attack. The DDoS Cloudflare attack, at its peak, was 3.8 terabits per seconds (Tbps) and had a duration of around 65 seconds. In this article, we’ll dive into the details of the attack and determine how it was […] The post Largest DDoS Cloudflare Attack On Global Sectors Mitigated appeared first on TuxCare.

DDOS 69
article thumbnail

The 4TB Samsung T5 SSD is back in stock and almost 50% off at Amazon

Zero Day

The Samsung T5 Evo 4TB portable SSD is almost $200 off at Amazon, saving you 46% on all the storage space you'll need for games, documents, photos, and videos. But you'll have to hurry, you might not see an SSD deal this good again until Black Friday.

98
article thumbnail

GPS Jamming Is Screwing With Norwegian Planes

WIRED Threat Level

So much jamming is taking place in northeastern Norway, regulators no longer want to know.

95
article thumbnail

This Android smartwatch with '100-hour battery life' is one of my favorite Amazon deals right now

Zero Day

OnePlus launched one of the worst smartwatches ever in 2021, so I was pleasantly surprised to find the OnePlus Watch 2 beats Google in almost every respect. It's currently $50 off on Amazon.

75
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.