Mon.Jun 10, 2024

article thumbnail

Exploiting Mistyped URLs

Schneier on Security

Interesting research: “ Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains “: Abstract: Web users often follow hyperlinks hastily, expecting them to be correctly programmed. However, it is possible those links contain typos or other mistakes. By discovering active but erroneous hyperlinks, a malicious actor can spoof a website or service, impersonating the expected content and phishing private information.

Phishing 323
article thumbnail

RSAC Fireside Chat: Jscrambler levels-up JavaScript security, slows GenAI-fueled privacy loss

The Last Watchdog

Could we be on the verge of Privacy Destruction 2.0, thanks to GenAI? Related: Next-level browser security That’s a question that spilled out of a thought-provoking conversation I had with Pedro Fortuna , co-founder and CTO of Jscrambler , at RSAC 2024. Jscrambler provides granular visibility and monitoring of JavaScript coding thus enabling companies to set and enforce security rules and privacy policies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Your Business Can Benefit from a Network Security Policy

Tech Republic Security

A company’s network must be secured to ensure the safety of its data against the risks of cyberthreats.

article thumbnail

News Alert: Criminal IP unveils innovative fraud detection data products on Snowflake Marketplace

The Last Watchdog

Torrance, Calif., June 10, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection data from its CTI search engine ‘ Criminal IP ‘ on the Snowflake Marketplace. Criminal IP is committed to offering advanced cybersecurity solutions through Snowflake, the leading cloud-based data warehousing platform.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Crowdstrike vs Trellix (2024): What Are The Main Differences?

Tech Republic Security

Endpoint detection and response software protects against a variety of threats and attacks. Learn about two of the most popular EDR options, CrowdStrike and Trellix, and how to protect your network.

Software 171
article thumbnail

Bypassing 2FA with phishing and OTP bots

SecureList

Introduction Two-factor authentication (2FA) is a security feature we have come to expect as standard by 2024. Most of today’s websites offer some form of it, and some of them won’t even let you use their service until you enable 2FA. Individual countries have adopted laws that require certain types of organizations to protect users’ accounts with 2FA.

Phishing 144

LifeWorks

More Trending

article thumbnail

Noodle RAT: Reviewing the New Backdoor Used by Chinese-Speaking Groups

Trend Micro

This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime.

article thumbnail

Snowflake Breach Exposes 165 Customers' Data in Ongoing Extortion Campaign

The Hacker News

As many as 165 customers of Snowflake are said to have had their information potentially exposed as part of an ongoing campaign designed to facilitate data theft and extortion, indicating the operation has broader implications than previously thought.

142
142
article thumbnail

Japanese video-sharing platform Niconico was victim of a cyber attack

Security Affairs

The Japanese video-sharing platform, Niconico, was forced to suspend its services following a cybersecurity incident. The Japanese video-sharing platform, Niconico, temporarily suspended its services following a large-scale cyberattack on June 8, 2024. “Due to the effects of a large-scale cyber attack, Niconico has been unavailable since early morning on June 8th” reads the incident notice published by the company. “We sincerely apologize for the inconvenience. ” In respo

article thumbnail

More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack

The Hacker News

Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial services industry in May 2024, Canadian cybersecurity firm eSentire disclosed last week.

Phishing 140
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Exploit for critical Veeam auth bypass available, patch now

Bleeping Computer

A proof-of-concept (PoC) exploit for a Veeam Backup Enterprise Manager authentication bypass flaw tracked as CVE-2024-29849 is now publicly available, making it urgent that admins apply the latest security updates. [.

Backups 128
article thumbnail

Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers

The Hacker News

Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild.

134
134
article thumbnail

UK NHS call for O-type blood donations following ransomware attack on London hospitals

Security Affairs

The UK NHS issued an urgent call for O-type blood donations following the recent ransomware attack that hit several London hospitals. The UK National Health Service (NHS) issued an urgent call for O-type blood donations due to the recent ransomware attack on Synnovis that disrupted operations at several healthcare organizations in London. In early June, a ransomware attack on pathology and diagnostic services provider Synnovis severely impacted the operations at several major NHS hospitals in Lo

article thumbnail

Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers

The Hacker News

Microsoft is warning about the potential abuse of Azure Service Tags by malicious actors to forge requests from a trusted service and get around firewall rules, thereby allowing them to gain unauthorized access to cloud resources.

Firewall 133
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Netgear WNR614 flaws allow device takeover, no fix available

Bleeping Computer

Researchers found half a dozen vulnerabilities of varying severity impacting Netgear WNR614 N300, a budget-friendly router that proved popular among home users and small businesses. [.

article thumbnail

Cybersecurity CPEs: Unraveling the What, Why & How

The Hacker News

Staying Sharp: Cybersecurity CPEs Explained Perhaps even more so than in other professional domains, cybersecurity professionals constantly face new threats. To ensure you stay on top of your game, many certification programs require earning Continuing Professional Education (CPE) credits.

article thumbnail

Veeam Patches Critical Security Flaw in Recovery Orchestrator (CVE-2024-29855)

Penetration Testing

Veeam, a prominent backup and disaster recovery solutions provider, has recently addressed a critical vulnerability (CVE-2024-29855) within its Recovery Orchestrator (VRO) software. This vulnerability, scoring a hefty 9.0 on the CVSS scale, could grant... The post Veeam Patches Critical Security Flaw in Recovery Orchestrator (CVE-2024-29855) appeared first on Cybersecurity News.

Backups 119
article thumbnail

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

We Live Security

The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn't be prouder – WeLiveSecurity has been named the Best Cybersecurity Vendor Blog!

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-5452: Critical PyTorch Lightning Vulnerability Exposes AI Models to Remote Hijacking

Penetration Testing

A severe remote code execution (RCE) vulnerability has been discovered in PyTorch Lightning, a widely-used framework for accelerating machine learning research and development. The vulnerability, tracked as CVE-2024-5452 (CVSS 9.8), enables attackers to remotely... The post CVE-2024-5452: Critical PyTorch Lightning Vulnerability Exposes AI Models to Remote Hijacking appeared first on Cybersecurity News.

article thumbnail

23andMe data breach under investigation in UK and Canada

Bleeping Computer

Privacy authorities in Canada and the United Kingdom have launched a joint investigation to assess the scope of sensitive customer information exposed in last year's 23andMe data breach. [.

article thumbnail

Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate

Cisco Security

Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True “Shift Left” DevSecOps Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True “Shift Left” DevSecOps

104
104
article thumbnail

Arm warns of actively exploited flaw in Mali GPU kernel drivers

Bleeping Computer

Arm has issued a security bulletin warning of a memory-related vulnerability in Bifrost and Valhall GPU kernel drivers that is being exploited in the wild. [.

105
105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Tips on Engaging Your Audience Through SMS Marketing

SecureBlitz

This post will show you tips on engaging your audience through SMS marketing. In today's digital era, where attention spans are fleeting and the competition for engagement is intense, companies are continuously seeking effective methods to connect with their audience. One such avenue that has proven highly impactful is SMS marketing. With nearly everyone owning […] The post Tips on Engaging Your Audience Through SMS Marketing appeared first on SecureBlitz Cybersecurity.

article thumbnail

Cylance confirms data breach linked to 'third-party' platform

Bleeping Computer

Cybersecurity company Cylance confirmed the legitimacy of data being sold on a hacking forum, stating that it is old data stolen from a "third-party platform." [.

article thumbnail

Nvidia Releases Critical Security Updates for GPU Drivers

SecureWorld News

Nvidia has released a major security update to address multiple high-severity vulnerabilities in its GPU drivers and virtual GPU (vGPU) software. The flaws, if left unpatched, could enable threat actors to execute arbitrary code, access sensitive data, escalate privileges, and cause denial-of-service conditions on affected systems. The most severe vulnerability, tracked as CVE-2024-0090, is an out-of-bounds write issue affecting both Windows and Linux GPU drivers.

article thumbnail

London hospitals face blood shortage after Synnovis ransomware attack

Bleeping Computer

England's NHS Blood and Transplant (NHSBT) has issued an urgent call to O Positive and O Negative blood donors to book appointments and donate after last week's cyberattack on pathology provider Synnovis impacted multiple hospitals in London. [.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ransomware Is ‘More Brutal’ Than Ever in 2024

WIRED Threat Level

As the fight against ransomware slogs on, security experts warn of a potential escalation to “real-world violence.” But recent police crackdowns are successfully disrupting the cybercriminal ecosystem.

article thumbnail

Apple enters AI arms race with new Apple Intelligence feature

Bleeping Computer

Apple unveiled its new 'Apple Intelligence' feature today at its 2024 Worldwide Developer Conference, finally unveiling its generative AI strategy that will power new personalized experiences on Apple devices. [.

87
article thumbnail

Clean Desk Policy

Tech Republic Security

When employees leave their workspaces behind — whether that’s for the night, the weekend, a longer vacation or just a quick lunch break — they may leave behind potentially sensitive information where it can easily be accessed by unauthorized parties. Unsecured USB drives, data files left open on desktops and printouts of confidential documents are.

87
article thumbnail

Gitloker attacks abuse GitHub notifications to push malicious oAuth apps

Bleeping Computer

Threat actors impersonate GitHub's security and recruitment teams in phishing attacks to hijack repositories using malicious OAuth apps in an ongoing extortion campaign wiping compromised repos. [.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!