Sun.Sep 15, 2024

article thumbnail

Weekly Update 417

Troy Hunt

Today was all about this whole idea of how we index and track data breaches. Not as HIBP, but rather as an industry; we simply don't have a canonical reference of breaches and their associated attributes. When they happened, how many people were impacted, any press on the incident, the official disclosure messaging and so on and so forth. As someone in the video today said, "what about the Airtel data breach?

article thumbnail

Where Are Governments in Their Zero-Trust Journey?

Lohrman on Security

While the federal government deadline has arrived on implementing a zero-trust cybersecurity model, many state and local governments have committed to zero-trust architecture as well.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

The Hacker News

Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are designed to harvest users' credentials.

Phishing 126
article thumbnail

Port of Seattle confirmed that Rhysida ransomware gang was behind the August attack

Security Affairs

Port of Seattle confirmed on Friday that the Rhysida ransomware group was behind the cyberattack that hit the agency in August. In August, a cyber attack hit the Port of Seattle, which also operates the Seattle-Tacoma International Airport, websites and phone systems were impacted. Media reported that the Port of Seattle, which also operates the Seattle-Tacoma International Airport, suffered a cyber attack that impacted the websites, email and phone services.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

CVE-2024-38816: Spring Framework Path Traversal Vulnerability Threatens Millions

Penetration Testing

A serious security vulnerability, identified as CVE-2024-38816 (CVSS 7.5), has been discovered in the popular Spring Framework, potentially affecting millions of Java applications worldwide. This path traversal vulnerability allows attackers... The post CVE-2024-38816: Spring Framework Path Traversal Vulnerability Threatens Millions appeared first on Cybersecurity News.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 11

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Malware 105

More Trending

article thumbnail

Get a Microsoft Office for Windows license for $35 - the lowest price of the year

Zero Day

Pay just once and get a lifetime license to the Microsoft Office 2021 app suite (including Word, Excel, and PowerPoint) on your PC for 84% off right now (there's a deal for a Mac version, too).

98
article thumbnail

Critical Flaw in NixOS Package Manager: CVE-2024-45593 Allows Arbitrary File Write with Root Permissions

Penetration Testing

A high-severity security flaw has been discovered in Nix, the popular package manager for Linux and Unix-based systems. Identified as CVE-2024-45593, this vulnerability poses a significant threat, allowing malicious users... The post Critical Flaw in NixOS Package Manager: CVE-2024-45593 Allows Arbitrary File Write with Root Permissions appeared first on Cybersecurity News.

article thumbnail

SOC 2 Compliance Provides AppViewX Customers Security and Data Protection Assurance

Security Boulevard

At AppViewX, our top priority is safeguarding the digital identities that are the backbone of modern enterprises. With hundreds of customers and millions of certificates under management, AppViewX bears a significant responsibility to protect its customers’ critical data and infrastructure. This commitment to security is not merely a claim. It is substantiated through independent audits […] The post SOC 2 Compliance Provides AppViewX Customers Security and Data Protection Assurance appeared firs

article thumbnail

BadIIS Malware : 35+ IIS Servers Compromised in DragonRank Campaign

Penetration Testing

A recent report from Cisco Talos has exposed a new threat actor named DragonRank, a Chinese-speaking group specializing in SEO manipulation and cyberattacks. This group operates by exploiting vulnerable web... The post BadIIS Malware : 35+ IIS Servers Compromised in DragonRank Campaign appeared first on Cybersecurity News.

Malware 73
article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

The Rise of AI Voicemail Scams, Political Donation Privacy Concerns

Security Boulevard

In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th anniversary of the podcast and share some reflections and fun facts about the journey.

Scams 63
article thumbnail

New Zero-Day Emerges After Microsoft Patch Tuesday: CVE-2024-43461 Targets Windows MSHTML

Penetration Testing

In an unexpected turn of events, Microsoft has revised its September 2024 Patch Tuesday security advisory, revealing a fifth zero-day vulnerability actively exploited in the wild. The disclosure comes just... The post New Zero-Day Emerges After Microsoft Patch Tuesday: CVE-2024-43461 Targets Windows MSHTML appeared first on Cybersecurity News.

article thumbnail

USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis

Security Boulevard

Authors/Presenters:Bingyu Shen, Tianyi Shan, Yuanyuan Zhou Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel. Permalink The post USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis appeared first on Security Boulevard.

article thumbnail

iPhone 16 vs. iPhone 15: What to consider if you're upgrading to Apple's base model

Zero Day

The latest iPhone 16 improves on last year's model by introducing AI features and a series of hardware changes, but should you take the leap?

75
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Don’t Fall for the Bait: Poseidon Stealer Masquerades as Sopha AI

Penetration Testing

In a new wave of cyberattacks, macOS users are being targeted by the Poseidon Stealer malware, disguised as an installer for the highly anticipated Sopha AI model from OpenAI. This... The post Don’t Fall for the Bait: Poseidon Stealer Masquerades as Sopha AI appeared first on Cybersecurity News.

Malware 62
article thumbnail

Every iPhone model that can receive Apple's iOS 18 update (and which ones won't)

Zero Day

The upcoming software version features AI enhancements to popular apps, better home screen customization, improved Siri, and more.

article thumbnail

A Guide to Tech-Driven Growth for Health Clinics

SecureBlitz

Here is a guide to tech-driven growth for health clinics. Growth driven by technology is essential for health clinics seeking efficiency in running facilities, improving the care of patients, and building a strong brand for competitive advantages in today's fast-moving healthcare environment. Technology makes administrative tasks easier and brings novel approaches toward managing patients, data […] The post A Guide to Tech-Driven Growth for Health Clinics appeared first on SecureBlitz Cybe

article thumbnail

Ajina.Banker: Unmasking the Android Malware Targeting Central Asian Banks

Penetration Testing

Cybersecurity analysts at Group-IB have uncovered a sophisticated malware campaign targeting bank customers in Central Asia. Dubbed “Ajina.Banker,” this Android malware poses a significant threat to users’ personal and financial... The post Ajina.Banker: Unmasking the Android Malware Targeting Central Asian Banks appeared first on Cybersecurity News.

Banking 56
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Get 3 months of Xbox Game Pass Ultimate for $36 - here's how

Zero Day

Try or gift Xbox Game Pass for three months for 28% off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.

Mobile 40
article thumbnail

Iranian Cyberespionage Campaign Targets Iraqi Government

Penetration Testing

Check Point Research (CPR) has uncovered a sophisticated cyberespionage campaign aimed at the Iraqi government, bearing the hallmarks of Iranian state-sponsored threat actors. This campaign, which has been ongoing for... The post Iranian Cyberespionage Campaign Targets Iraqi Government appeared first on Cybersecurity News.