Mon.Jun 10, 2024

article thumbnail

Exploiting Mistyped URLs

Schneier on Security

Interesting research: “ Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains “: Abstract: Web users often follow hyperlinks hastily, expecting them to be correctly programmed. However, it is possible those links contain typos or other mistakes. By discovering active but erroneous hyperlinks, a malicious actor can spoof a website or service, impersonating the expected content and phishing private information.

Phishing 281
article thumbnail

RSAC Fireside Chat: Jscrambler levels-up JavaScript security, slows GenAI-fueled privacy loss

The Last Watchdog

Could we be on the verge of Privacy Destruction 2.0, thanks to GenAI? Related: Next-level browser security That’s a question that spilled out of a thought-provoking conversation I had with Pedro Fortuna , co-founder and CTO of Jscrambler , at RSAC 2024. Jscrambler provides granular visibility and monitoring of JavaScript coding thus enabling companies to set and enforce security rules and privacy policies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crowdstrike vs Trellix (2024): What Are The Main Differences?

Tech Republic Security

Endpoint detection and response software protects against a variety of threats and attacks. Learn about two of the most popular EDR options, CrowdStrike and Trellix, and how to protect your network.

Software 150
article thumbnail

News Alert: Criminal IP unveils innovative fraud detection data products on Snowflake Marketplace

The Last Watchdog

Torrance, Calif., June 10, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection data from its CTI search engine ‘ Criminal IP ‘ on the Snowflake Marketplace. Criminal IP is committed to offering advanced cybersecurity solutions through Snowflake, the leading cloud-based data warehousing platform.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Noodle RAT: Reviewing the New Backdoor Used by Chinese-Speaking Groups

Trend Micro

This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime.

article thumbnail

How Your Business Can Benefit from a Network Security Policy

Tech Republic Security

A company’s network must be secured to ensure the safety of its data against the risks of cyberthreats.

More Trending

article thumbnail

Bypassing 2FA with phishing and OTP bots

SecureList

Introduction Two-factor authentication (2FA) is a security feature we have come to expect as standard by 2024. Most of today’s websites offer some form of it, and some of them won’t even let you use their service until you enable 2FA. Individual countries have adopted laws that require certain types of organizations to protect users’ accounts with 2FA.

Phishing 128
article thumbnail

Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia

The Hacker News

Google has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation connected to the People’s Republic of China (PRC). "The coordinated inauthentic network uploaded content in Chinese and English about China and U.S.

130
130
article thumbnail

Netgear WNR614 flaws allow device takeover, no fix available

Bleeping Computer

Researchers found half a dozen vulnerabilities of varying severity impacting Netgear WNR614 N300, a budget-friendly router that proved popular among home users and small businesses. [.

article thumbnail

Snowflake Breach Exposes 165 Customers' Data in Ongoing Extortion Campaign

The Hacker News

As many as 165 customers of Snowflake are said to have had their information potentially exposed as part of an ongoing campaign designed to facilitate data theft and extortion, indicating the operation has broader implications than previously thought.

123
123
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Japanese video-sharing platform Niconico was victim of a cyber attack

Security Affairs

The Japanese video-sharing platform, Niconico, was forced to suspend its services following a cybersecurity incident. The Japanese video-sharing platform, Niconico, temporarily suspended its services following a large-scale cyberattack on June 8, 2024. “Due to the effects of a large-scale cyber attack, Niconico has been unavailable since early morning on June 8th” reads the incident notice published by the company. “We sincerely apologize for the inconvenience. ” In respo

article thumbnail

More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack

The Hacker News

Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial services industry in May 2024, Canadian cybersecurity firm eSentire disclosed last week.

Phishing 121
article thumbnail

UK NHS call for O-type blood donations following ransomware attack on London hospitals

Security Affairs

The UK NHS issued an urgent call for O-type blood donations following the recent ransomware attack that hit several London hospitals. The UK National Health Service (NHS) issued an urgent call for O-type blood donations due to the recent ransomware attack on Synnovis that disrupted operations at several healthcare organizations in London. In early June, a ransomware attack on pathology and diagnostic services provider Synnovis severely impacted the operations at several major NHS hospitals in Lo

article thumbnail

Veeam Patches Critical Security Flaw in Recovery Orchestrator (CVE-2024-29855)

Penetration Testing

Veeam, a prominent backup and disaster recovery solutions provider, has recently addressed a critical vulnerability (CVE-2024-29855) within its Recovery Orchestrator (VRO) software. This vulnerability, scoring a hefty 9.0 on the CVSS scale, could grant... The post Veeam Patches Critical Security Flaw in Recovery Orchestrator (CVE-2024-29855) appeared first on Cybersecurity News.

Backups 115
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

23andMe data breach under investigation in UK and Canada

Bleeping Computer

Privacy authorities in Canada and the United Kingdom have launched a joint investigation to assess the scope of sensitive customer information exposed in last year's 23andMe data breach. [.

article thumbnail

CVE-2024-5452: Critical PyTorch Lightning Vulnerability Exposes AI Models to Remote Hijacking

Penetration Testing

A severe remote code execution (RCE) vulnerability has been discovered in PyTorch Lightning, a widely-used framework for accelerating machine learning research and development. The vulnerability, tracked as CVE-2024-5452 (CVSS 9.8), enables attackers to remotely... The post CVE-2024-5452: Critical PyTorch Lightning Vulnerability Exposes AI Models to Remote Hijacking appeared first on Cybersecurity News.

article thumbnail

Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers

The Hacker News

Microsoft is warning about the potential abuse of Azure Service Tags by malicious actors to forge requests from a trusted service and get around firewall rules, thereby allowing them to gain unauthorized access to cloud resources.

Firewall 108
article thumbnail

Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate

Cisco Security

Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True “Shift Left” DevSecOps Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True “Shift Left” DevSecOps

109
109
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Clean Desk Policy

Tech Republic Security

When employees leave their workspaces behind — whether that’s for the night, the weekend, a longer vacation or just a quick lunch break — they may leave behind potentially sensitive information where it can easily be accessed by unauthorized parties. Unsecured USB drives, data files left open on desktops and printouts of confidential documents are.

88
article thumbnail

Cylance confirms data breach linked to 'third-party' platform

Bleeping Computer

Cybersecurity company Cylance confirmed the legitimacy of data being sold on a hacking forum, stating that it is old data stolen from a "third-party platform." [.

article thumbnail

Cybersecurity CPEs: Unraveling the What, Why & How

The Hacker News

Staying Sharp: Cybersecurity CPEs Explained Perhaps even more so than in other professional domains, cybersecurity professionals constantly face new threats. To ensure you stay on top of your game, many certification programs require earning Continuing Professional Education (CPE) credits.

article thumbnail

Arm warns of actively exploited flaw in Mali GPU kernel drivers

Bleeping Computer

Arm has issued a security bulletin warning of a memory-related vulnerability in Bifrost and Valhall GPU kernel drivers that is being exploited in the wild. [.

105
105
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Ransomware Is ‘More Brutal’ Than Ever in 2024

WIRED Threat Level

As the fight against ransomware slogs on, security experts warn of a potential escalation to “real-world violence.” But recent police crackdowns are successfully disrupting the cybercriminal ecosystem.

article thumbnail

London hospitals face blood shortage after Synnovis ransomware attack

Bleeping Computer

England's NHS Blood and Transplant (NHSBT) has issued an urgent call to O Positive and O Negative blood donors to book appointments and donate after last week's cyberattack on pathology provider Synnovis impacted multiple hospitals in London. [.

article thumbnail

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

We Live Security

The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn't be prouder – WeLiveSecurity has been named the Best Cybersecurity Vendor Blog!

article thumbnail

Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers

The Hacker News

Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild.

108
108
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Apple enters AI arms race with new Apple Intelligence feature

Bleeping Computer

Apple unveiled its new 'Apple Intelligence' feature today at its 2024 Worldwide Developer Conference, finally unveiling its generative AI strategy that will power new personalized experiences on Apple devices. [.

88
article thumbnail

Tips on Engaging Your Audience Through SMS Marketing

SecureBlitz

This post will show you tips on engaging your audience through SMS marketing. In today's digital era, where attention spans are fleeting and the competition for engagement is intense, companies are continuously seeking effective methods to connect with their audience. One such avenue that has proven highly impactful is SMS marketing. With nearly everyone owning […] The post Tips on Engaging Your Audience Through SMS Marketing appeared first on SecureBlitz Cybersecurity.

article thumbnail

Gitloker attacks abuse GitHub notifications to push malicious oAuth apps

Bleeping Computer

Threat actors impersonate GitHub's security and recruitment teams in phishing attacks to hijack repositories using malicious OAuth apps in an ongoing extortion campaign wiping compromised repos. [.

article thumbnail

Euro 2024: Ensuring Cybersecurity During Football Fever

ZoneAlarm

As Euro 2024 draws near, the excitement among football fans is palpable. However, while millions of enthusiasts gear up to enjoy the beautiful game, cybercriminals are also preparing to exploit the fervor. From phishing scams to malware, the digital threats during such high-profile events are real and significant. Major sporting events like Euro 2024 attract … The post Euro 2024: Ensuring Cybersecurity During Football Fever appeared first on ZoneAlarm Security Blog.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.