Sun.Oct 13, 2024

article thumbnail

Misinformation, Online Scams Surging Following Historic Hurricanes

Lohrman on Security

Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and Milton pose significant new online threats, including misinformation and fraud.

Scams 267
article thumbnail

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

The Hacker News

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 493 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. A cyber attack hit Iranian government sites and nuclear facilities Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution Iran an

article thumbnail

Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware

Trend Micro

Trend Micro researchers have uncovered a surge of malicious activities involving a threat actor group that we track as Water Makara. This group is targeting enterprises in Brazil, deploying banking malware using obfuscated JavaScript to slip past security defenses.

Malware 128
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 15

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Over 300,000! GorillaBot: The New King of DDoS Attacks Hidden cryptocurrency mining and theft campaign affected over 28,000 users The Mongolian Skimmer: different clothes, equally dangerous Akira and Fog ransomware now exploit cri

Malware 131
article thumbnail

Misinformation, Online Scams Surging Following Historic Hurricanes

Security Boulevard

Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and Milton pose significant new online threats, including misinformation and fraud. The post Misinformation, Online Scams Surging Following Historic Hurricanes appeared first on Security Boulevard.

Scams 121

More Trending

article thumbnail

Does AI Enhance Virtual Reality Experiences?

SecureWorld News

Virtual reality (VR) technology has transformed how we experience digital environments. This technology simulates environments with striking realism, providing a highly immersive experience for users, and triggering their visual and auditory senses so they feel that they are truly in the moment in a virtual world. The emergence of artificial intelligence (AI) has also transcended these experiences.

article thumbnail

Popular Java Security Framework ‘pac4j’ Vulnerable to RCE (CVE-2023-25581)

Penetration Testing

A new analysis by security researcher Michael Stepankin (@artsploit) of the GitHub Security Lab (GHSL) has uncovered a critical vulnerability in pac4j, a widely-used Java security framework. This vulnerability, tracked... The post Popular Java Security Framework ‘pac4j’ Vulnerable to RCE (CVE-2023-25581) appeared first on Cybersecurity News.

article thumbnail

The 65+ best Walmart deals you can shop now: Live updates

Zero Day

Walmart's major sale on tech, home, toys, and more ahead of the holidays ends today. Don't miss these deals from Apple, Samsung, and more.

98
article thumbnail

Bitcoin Core Vulnerability (CVE-2024-35202) Enables Remote Node Crashes

Penetration Testing

A high-severity vulnerability, tracked as CVE-2024-35202 and assigned a CVSS v3.0 base score of 7.5, has been disclosed in the Bitcoin Core software. Exploitation of this vulnerability permits remote attackers... The post Bitcoin Core Vulnerability (CVE-2024-35202) Enables Remote Node Crashes appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems

Security Boulevard

Executive Summary Researchers at the Spark Research Lab (University of Texas at Austin)1, under the supervision of Symmetry CEO Professor. The post ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems appeared first on Symmetry Systems. The post ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems appeared first on Security Boulevard.

94
article thumbnail

Thousands of Fortinet Devices Remain Exposed to RCE CVE-2024-23113 Vulnerability

Penetration Testing

A recent report from the Shadowserver Foundation has revealed a concerning number of Fortinet devices remain vulnerable to a critical remote code execution (RCE) vulnerability, despite patches being available for... The post Thousands of Fortinet Devices Remain Exposed to RCE CVE-2024-23113 Vulnerability appeared first on Cybersecurity News.

article thumbnail

Patch-22: The Catch of Waiting to Fix Cybersecurity Vulnerabilities 

Security Boulevard

One of the biggest dilemmas for security teams is when to patch vulnerabilities. This is a classic “Patch-22” situation—patching immediately can be time-consuming and disruptive, but waiting leaves your organization exposed to cyber threats. It’s a tough balancing act between fixing vulnerabilities and maintaining business continuity. With cyberattacks evolving and becoming more frequent, waiting to […] The post Patch-22: The Catch of Waiting to Fix Cybersecurity Vulnerabilities appeared first

article thumbnail

Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update

Penetration Testing

The Apache Software Foundation has released a security update for Apache Roller, a popular Java-based blogging platform. This update addresses a critical Cross-site Request Forgery (CSRF) vulnerability that could allow... The post Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Kentucky Consumer Data Protection Act (KCDPA)

Security Boulevard

What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed to safeguard the personal information of Kentucky residents. Like other state privacy regulations, KCDPA sets rules for how businesses collect, use, store, and share consumer data. The law aims to ensure that individuals have greater control over their […] The post Kentucky Consumer Data Protection Act (KCDPA) appeared first on Centraleyes.

64
article thumbnail

GitHub Enterprise Server Patches Critical Security Flaw – CVE-2024-9487 (CVSS 9.5)

Penetration Testing

GitHub has released security updates to address two vulnerabilities in GitHub Enterprise Server, one of which could allow attackers to bypass authentication and gain unauthorized access. The most severe vulnerability,... The post GitHub Enterprise Server Patches Critical Security Flaw – CVE-2024-9487 (CVSS 9.5) appeared first on Cybersecurity News.

article thumbnail

Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits

Security Boulevard

In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of a current hurricane on Florida, offering advice on using iPhone and Android satellite communication features during emergencies. The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast.

article thumbnail

Banking Trojan TrickMo Compromised 13,000 Devices, Now Steals Device Unlock Patterns and PINs

Penetration Testing

Aazim Yaswant, a Malware Analyst at Zimperium, has published a comprehensive analysis of the latest TrickMo samples, revealing alarming new capabilities in this banking trojan. Originally disclosed by Cleafy in... The post Banking Trojan TrickMo Compromised 13,000 Devices, Now Steals Device Unlock Patterns and PINs appeared first on Cybersecurity News.

Banking 91
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Kentucky Consumer Data Protection Act (KCDPA)

Centraleyes

What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed to safeguard the personal information of Kentucky residents. Like other state privacy regulations, KCDPA sets rules for how businesses collect, use, store, and share consumer data. The law aims to ensure that individuals have greater control over their personal information while holding organizations accountable for responsible data practices.

article thumbnail

DarkVision RAT: The $60 Malware Threatening Your Data

Penetration Testing

A detailed technical analysis of DarkVision RAT by security researcher Muhammed Irfan V A at ThreatLabz has shed light on the evolution and growing sophistication of this remote access trojan... The post DarkVision RAT: The $60 Malware Threatening Your Data appeared first on Cybersecurity News.

Malware 60
article thumbnail

Subzy: Live Subdomain takeover vulnerability checker

Hacker's King

Sub-domains play a vital role in how websites function, but they can also be points of vulnerability, posing significant security risks. Enter Subzy, a robust open-source tool designed to assist cybersecurity professionals in identifying live sub-domain takeover vulnerabilities before they can be exploited by malicious actors. In this article, we’ll take a close look at how Subzy operates.

DNS 52
article thumbnail

$50,000 Bounty: Researcher Reveals Critical Zendesk Email Spoofing Flaw (CVE-2024-49193)

Penetration Testing

In a detailed analysis by security researcher Daniel, a serious vulnerability in Zendesk’s email management system, tracked as CVE-2024-49193, has been revealed. This flaw exposes companies using Zendesk to a... The post $50,000 Bounty: Researcher Reveals Critical Zendesk Email Spoofing Flaw (CVE-2024-49193) appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Weekly Update 421

Troy Hunt

It wasn't easy talking about the Muah.AI data breach. It's not just the rampant child sexual abuse material throughout the system (or at least requests for the AI to generate images of it), it's the reactions of people to it. The tweets justifying it on the basis of there being noo "actual" abuse, the characterisation of this being akin to "merely thoughts in someone's head", and following my recording of this video, the backlash from their users about any att

article thumbnail

Plane Project Management Tool Patches Critical SSRF Flaw – CVE-2024-47830 (CVSS 9.3)

Penetration Testing

A critical security vulnerability has been discovered and patched in Plane, a popular open-source project management tool. The vulnerability, identified as CVE-2024-47830 and assigned a CVSS score of 9.3, could... The post Plane Project Management Tool Patches Critical SSRF Flaw – CVE-2024-47830 (CVSS 9.3) appeared first on Cybersecurity News.

article thumbnail

USENIX NSDI ’24 – Spectrumize: Spectrum-Efficient Satellite Networks for the Internet of Things

Security Boulevard

Authors/Presenters:Vaibhav Singh, Tusher Chakraborty, Suraj Jog, Om Chabra, Deepak Vasisht, Ranveer Chandra Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.