Sun.Oct 13, 2024

article thumbnail

Misinformation, Online Scams Surging Following Historic Hurricanes

Lohrman on Security

Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and Milton pose significant new online threats, including misinformation and fraud.

Scams 206
article thumbnail

Weekly Update 421

Troy Hunt

It wasn't easy talking about the Muah.AI data breach. It's not just the rampant child sexual abuse material throughout the system (or at least requests for the AI to generate images of it), it's the reactions of people to it. The tweets justifying it on the basis of there being noo "actual" abuse, the characterisation of this being akin to "merely thoughts in someone's head", and following my recording of this video, the backlash from their users about any att

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

The Hacker News

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region.

126
126
article thumbnail

Misinformation, Online Scams Surging Following Historic Hurricanes

Security Boulevard

Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and Milton pose significant new online threats, including misinformation and fraud. The post Misinformation, Online Scams Surging Following Historic Hurricanes appeared first on Security Boulevard.

Scams 97
article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 15

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Over 300,000! GorillaBot: The New King of DDoS Attacks Hidden cryptocurrency mining and theft campaign affected over 28,000 users The Mongolian Skimmer: different clothes, equally dangerous Akira and Fog ransomware now exploit cri

Malware 95
article thumbnail

Popular Java Security Framework ‘pac4j’ Vulnerable to RCE (CVE-2023-25581)

Penetration Testing

A new analysis by security researcher Michael Stepankin (@artsploit) of the GitHub Security Lab (GHSL) has uncovered a critical vulnerability in pac4j, a widely-used Java security framework. This vulnerability, tracked... The post Popular Java Security Framework ‘pac4j’ Vulnerable to RCE (CVE-2023-25581) appeared first on Cybersecurity News.

More Trending

article thumbnail

Thousands of Fortinet Devices Remain Exposed to RCE CVE-2024-23113 Vulnerability

Penetration Testing

A recent report from the Shadowserver Foundation has revealed a concerning number of Fortinet devices remain vulnerable to a critical remote code execution (RCE) vulnerability, despite patches being available for... The post Thousands of Fortinet Devices Remain Exposed to RCE CVE-2024-23113 Vulnerability appeared first on Cybersecurity News.

article thumbnail

The 65+ best Walmart deals you can shop now: Live updates

Zero Day

Walmart's major sale on tech, home, toys, and more ahead of the holidays ends today. Don't miss these deals from Apple, Samsung, and more.

98
article thumbnail

GitHub Enterprise Server Patches Critical Security Flaw – CVE-2024-9487 (CVSS 9.5)

Penetration Testing

GitHub has released security updates to address two vulnerabilities in GitHub Enterprise Server, one of which could allow attackers to bypass authentication and gain unauthorized access. The most severe vulnerability,... The post GitHub Enterprise Server Patches Critical Security Flaw – CVE-2024-9487 (CVSS 9.5) appeared first on Cybersecurity News.

article thumbnail

Patch-22: The Catch of Waiting to Fix Cybersecurity Vulnerabilities 

Security Boulevard

One of the biggest dilemmas for security teams is when to patch vulnerabilities. This is a classic “Patch-22” situation—patching immediately can be time-consuming and disruptive, but waiting leaves your organization exposed to cyber threats. It’s a tough balancing act between fixing vulnerabilities and maintaining business continuity. With cyberattacks evolving and becoming more frequent, waiting to […] The post Patch-22: The Catch of Waiting to Fix Cybersecurity Vulnerabilities appeared first

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Bitcoin Core Vulnerability (CVE-2024-35202) Enables Remote Node Crashes

Penetration Testing

A high-severity vulnerability, tracked as CVE-2024-35202 and assigned a CVSS v3.0 base score of 7.5, has been disclosed in the Bitcoin Core software. Exploitation of this vulnerability permits remote attackers... The post Bitcoin Core Vulnerability (CVE-2024-35202) Enables Remote Node Crashes appeared first on Cybersecurity News.

article thumbnail

USENIX NSDI ’24 – Spectrumize: Spectrum-Efficient Satellite Networks for the Internet of Things

Security Boulevard

Authors/Presenters:Vaibhav Singh, Tusher Chakraborty, Suraj Jog, Om Chabra, Deepak Vasisht, Ranveer Chandra Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

article thumbnail

Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update

Penetration Testing

The Apache Software Foundation has released a security update for Apache Roller, a popular Java-based blogging platform. This update addresses a critical Cross-site Request Forgery (CSRF) vulnerability that could allow... The post Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update appeared first on Cybersecurity News.

article thumbnail

Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware

Trend Micro

Trend Micro researchers have uncovered a surge of malicious activities involving a threat actor group that we track as Water Makara. This group is targeting enterprises in Brazil, deploying banking malware using obfuscated JavaScript to slip past security defenses.

Malware 65
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Microsoft Issues Guidance to Combat Rising Kerberoasting Attacks

Penetration Testing

Microsoft has released new guidance to help organizations defend against Kerberoasting attacks, a growing threat to Active Directory (AD) environments. This cyberattack exploits the Kerberos authentication protocol to steal AD... The post Microsoft Issues Guidance to Combat Rising Kerberoasting Attacks appeared first on Cybersecurity News.

article thumbnail

Kentucky Consumer Data Protection Act (KCDPA)

Security Boulevard

What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed to safeguard the personal information of Kentucky residents. Like other state privacy regulations, KCDPA sets rules for how businesses collect, use, store, and share consumer data. The law aims to ensure that individuals have greater control over their […] The post Kentucky Consumer Data Protection Act (KCDPA) appeared first on Centraleyes.

62
article thumbnail

Banking Trojan TrickMo Compromised 13,000 Devices, Now Steals Device Unlock Patterns and PINs

Penetration Testing

Aazim Yaswant, a Malware Analyst at Zimperium, has published a comprehensive analysis of the latest TrickMo samples, revealing alarming new capabilities in this banking trojan. Originally disclosed by Cleafy in... The post Banking Trojan TrickMo Compromised 13,000 Devices, Now Steals Device Unlock Patterns and PINs appeared first on Cybersecurity News.

Banking 57
article thumbnail

Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits

Security Boulevard

In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of a current hurricane on Florida, offering advice on using iPhone and Android satellite communication features during emergencies. The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Kentucky Consumer Data Protection Act (KCDPA)

Centraleyes

What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed to safeguard the personal information of Kentucky residents. Like other state privacy regulations, KCDPA sets rules for how businesses collect, use, store, and share consumer data. The law aims to ensure that individuals have greater control over their personal information while holding organizations accountable for responsible data practices.

article thumbnail

ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems

Security Boulevard

Executive Summary Researchers at the Spark Research Lab (University of Texas at Austin)1, under the supervision of Symmetry CEO Professor. The post ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems appeared first on Symmetry Systems. The post ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems appeared first on Security Boulevard.

56
article thumbnail

DarkVision RAT: The $60 Malware Threatening Your Data

Penetration Testing

A detailed technical analysis of DarkVision RAT by security researcher Muhammed Irfan V A at ThreatLabz has shed light on the evolution and growing sophistication of this remote access trojan... The post DarkVision RAT: The $60 Malware Threatening Your Data appeared first on Cybersecurity News.

Malware 53
article thumbnail

Does AI Enhance Virtual Reality Experiences?

SecureWorld News

Virtual reality (VR) technology has transformed how we experience digital environments. This technology simulates environments with striking realism, providing a highly immersive experience for users, and triggering their visual and auditory senses so they feel that they are truly in the moment in a virtual world. The emergence of artificial intelligence (AI) has also transcended these experiences.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

$50,000 Bounty: Researcher Reveals Critical Zendesk Email Spoofing Flaw (CVE-2024-49193)

Penetration Testing

In a detailed analysis by security researcher Daniel, a serious vulnerability in Zendesk’s email management system, tracked as CVE-2024-49193, has been revealed. This flaw exposes companies using Zendesk to a... The post $50,000 Bounty: Researcher Reveals Critical Zendesk Email Spoofing Flaw (CVE-2024-49193) appeared first on Cybersecurity News.

article thumbnail

Subzy: Live Subdomain takeover vulnerability checker

Hacker's King

Sub-domains play a vital role in how websites function, but they can also be points of vulnerability, posing significant security risks. Enter Subzy, a robust open-source tool designed to assist cybersecurity professionals in identifying live sub-domain takeover vulnerabilities before they can be exploited by malicious actors. In this article, we’ll take a close look at how Subzy operates.

DNS 52
article thumbnail

Plane Project Management Tool Patches Critical SSRF Flaw – CVE-2024-47830 (CVSS 9.3)

Penetration Testing

A critical security vulnerability has been discovered and patched in Plane, a popular open-source project management tool. The vulnerability, identified as CVE-2024-47830 and assigned a CVSS score of 9.3, could... The post Plane Project Management Tool Patches Critical SSRF Flaw – CVE-2024-47830 (CVSS 9.3) appeared first on Cybersecurity News.