Fri.Dec 13, 2024

article thumbnail

Ultralytics Supply-Chain Attack

Schneier on Security

Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary : On December 4, a malicious version 8.3.41 of the popular AI library ultralytics —which has almost 60 million downloads—was published to the Python Package Index (PyPI) package repository. The package contained downloader code that was downloading the XMRig coinminer.

154
154
article thumbnail

Australian IT Pros Urged to Guard Against Chinese Cybersecurity Threats

Tech Republic Security

Australian IT pros are urged to strengthen defenses as Chinese cyber threats target critical infrastructure and sensitive data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors

Security Boulevard

An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on the dark web. The post Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors appeared first on Security Boulevard.

Malware 107
article thumbnail

U.S. authorities seized cybercrime marketplace Rydox

Security Affairs

The U.S. Department of Justice (DoJ) announced the seizure of the cybercrime marketplace Rydox (“rydox.ru” and “rydox[.]cc”). The U.S. Department of Justice (DoJ) seized Rydox, a cybercrime marketplace for selling stolen personal data and fraud tools. Kosovars authorities arrested three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why the US Military Can't Just Shoot Down the Mystery Drones

WIRED Threat Level

Small, easily weaponizable drones have become a feature of battlefields from the Middle East to Ukraine. Now the threat looms over the US homelandand the Pentagon's ability to respond is limited.

97
article thumbnail

Ransomware in the Global Healthcare Industry  

Security Boulevard

Healthcare organizations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences. The post Ransomware in the Global Healthcare Industry appeared first on Security Boulevard.

More Trending

article thumbnail

Securing Your Team's Ansible Automation Workflows

SecureWorld News

Automation is the backbone of modern IT and DevOps operations, which is why open-source Infrastructure as Code (IaC) tools like Ansible are gaining momentum with organizations looking to enhance their efficiency. However, the scourge of today's technological boom is that convenience is often prioritized over security. Some enterprises neglect to leverage the full protection potential of modern solutions, only to be swamped in questionably effective and tedious manual routines.

article thumbnail

The New Jersey Drone Mystery May Not Actually Be That Mysterious

WIRED Threat Level

A flurry of drone sightings across New Jersey and New York has sparked national intrigue and US government responses. But experts are pouring cold water on Americas hottest new conspiracy theory.

article thumbnail

Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight

Security Boulevard

By focusing on prioritized, actionable insights, security teams can keep pace with the rapid expansion of the attack surface, manage frequent changes across their digital infrastructure and proactively address evolving attack tactics, techniques and procedures (TTPs). The post Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight appeared first on Security Boulevard.

article thumbnail

Over 15,000 Sites at Risk: Woffice WordPress Theme Vulnerabilities Could Lead to Full Site Takeovers

Penetration Testing

Patchstack has disclosed two critical vulnerabilities in the widely used Woffice WordPress theme, a premium intranet/extranet solution with over 15,000 sales. Developed by Xtendify, the Woffice theme offers team and... The post Over 15,000 Sites at Risk: Woffice WordPress Theme Vulnerabilities Could Lead to Full Site Takeovers appeared first on Cybersecurity News.

Risk 70
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global

WIRED Threat Level

The white supremacist Robert Rundo faces years in prison. But the Active Club network he helped create has proliferated in countries around the world, from Eastern Europe to South America.

68
article thumbnail

DCOM Upload & Execute: A New Backdoor Technique Unveiled

Penetration Testing

Deep Instinct Security Researcher Eliran Nissan has uncovered a new and potent lateral movement technique, DCOM Upload & Execute, redefining how attackers might exploit Distributed Component Object Model (DCOM) interfaces... The post DCOM Upload & Execute: A New Backdoor Technique Unveiled appeared first on Cybersecurity News.

article thumbnail

German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox

Security Affairs

The German agency BSI has sinkholed a botnet composed of 30,000 devices shipped with BadBox malware pre-installed. The Federal Office for Information Security (BSI) announced it had blocked communication between the 30,000 devices infected with the BadBox malware and the C2. The devices were all located in Germany, they were all using outdatedAndroidversions. “The Federal Office for Information Security (BSI) has now blocked communication between the malware and the computer in up to 30,00

article thumbnail

Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication

Penetration Testing

Kaspersky Labs has unveiled research on the return of “The Mask,” also known as Careto, a legendary Advanced Persistent Threat (APT) actor. After a decade-long silence since its last known... The post Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions

Security Boulevard

The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions. Anyone can make predictions (and far too many do), but actually being correct is another matter altogether. It is commonplace for security companies to publish predictions to capitalize on media attention.

article thumbnail

Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management

Hacker Combat

Cyber threats can wreak havoc on businesses, from data breaches to loss of reputation. Luckily, there are effective strategies available that can reduce cybersecurity risk. Avoidance is one of the. The post Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management appeared first on Hacker Combat.

Risk 59
article thumbnail

Digital Finance: How Do Banks Protect Their Customers’ Money and Data from Cybercriminals?

Security Boulevard

Cybercriminals are employing increasingly sophisticated methods to access our money and data, making this issue particularly relevant for large European banks, where significant financial assets are concentrated. The post Digital Finance: How Do Banks Protect Their Customers Money and Data from Cybercriminals? appeared first on Security Boulevard.

Banking 59
article thumbnail

5 Critical Questions to Ask When Evaluating MDR Solutions

Digital Shadows

With the ever-growing cybersecurity threats companies face today and a shortage of cybersecurity talent, its no wonder that many are turning to MDR solutions. Ideally, managed detection and response providers can help companies tackle problems like overburdened security teams, lack of expertise in cloud security, or alert noise. Choosing the right MDR provider for your organization is crucial, so its important to evaluate their capabilities before committing.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Feeling Reassured with Top-Tier API Security Measures

Security Boulevard

Are You Maximizing Your API Security Measures? If youre a CISO or a cybersecurity professional, you understand the importance of robust API security measures. But, do these measures ensure optimum protection when non-human identities (NHIs) are involved? The disconnect between security and R&D teams can lead to exploitable gaps in API security. A comprehensive approach [] The post Feeling Reassured with Top-Tier API Security Measures appeared first on Entro.

CISO 52
article thumbnail

HTML Smuggling To Bypass Restrictions On Certain Files

Hacker's King

Security scanners are now available on every web server, computer, and even personal smartphone. However, do they truly provide protection against malicious files? The answer is simple: "Cybersecurity consists of 70% system and 30% human knowledge." This means that users must also be educated about computer and internet security. You may also like to read: TGPT AI Chatbot For Your Linux Terminal In this blog, we will explore a method used by attackers to bypass scanners and send malicious files

article thumbnail

How Can Strong Secrets Management Prevent Data Breaches

Security Boulevard

Is Your Secrets Management Strong Enough to Prevent Data Breaches? In an increasingly connected digital world, secrets management has emerged as a critical component of cybersecurity. How can strong secrets management prevent data breaches, and why should it be a priority for organizations operating in the cloud? The Power of Non-Human Identities and Secrets A [] The post How Can Strong Secrets Management Prevent Data Breaches appeared first on Entro.

article thumbnail

Video: How Two Crypto Scammers Stole $230 Million in Bitcoin

eSecurity Planet

This video covers Malone Lam and Jeandiel Serranos $230 million Bitcoin heist that involved using social engineering to bypass security. The scammers spent the stolen funds on luxury items but were caught after bragging online. Our expert highlights the risks of social engineering and the need for strong online security. The post Video: How Two Crypto Scammers Stole $230 Million in Bitcoin appeared first on eSecurity Planet.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Scaling Your Cyber Defense with Advanced IAM Solutions

Security Boulevard

How Crucial is the Role of Advanced IAM in Scaling Your Cyber Defense? With the rise in cyber threats, businesses worldwide realize the need for robust security infrastructure. An integral part of this infrastructure is Identity and Access Management (IAM). In an increasingly digital landscape, an advanced IAM strategy becomes a crucial pillar in scaling [] The post Scaling Your Cyber Defense with Advanced IAM Solutions appeared first on Entro.

article thumbnail

Abusing Microsoft’s UI Automation Framework: The New Evasion Technique Bypassing EDR

Penetration Testing

Akamai security researcher Tomer Peled has unveiled a novel attack technique exploiting Microsoft’s legacy UI Automation framework, a tool originally designed to enhance computer accessibility. The findings reveal how attackers... The post Abusing Microsoft’s UI Automation Framework: The New Evasion Technique Bypassing EDR appeared first on Cybersecurity News.

article thumbnail

2024 Year in Review: Features and Improvements in Pure Signalâ„¢ Scout

Security Boulevard

Team Cymru is excited to share our accomplishments in delivering new features and improvements in Pure Signal Scout. Thank you to our. The post 2024 Year in Review: Features and Improvements in Pure Signal Scout appeared first on Security Boulevard.

52
article thumbnail

What is gRPC and How Does it Enhance API Security?

IT Security Guru

As the reliance on APIs grows, so do the challenges of ensuring they are both fast and secure. Enter gRPC a high-performance, open-source framework that has revolutionised how systems communicate in real time. More than just a tool for building APIs, gRPC brings an added layer of efficiency and robust security features to the table. With its advanced protocol and streamlined architecture, gRPC is transforming the way developers tackle API vulnerabilities while maintaining lightning-fast perform

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Breaking the Air Gap Through Hardware Implants

Security Boulevard

IoT security assessments expose diverse technologies, use cases, and protocols. While wireless components like WiFi and Bluetooth enhance functionality and enable features like OTA updates, they also increase the attack surface. This blog explores the challenges of assessing non-wireless IoT devices and considers the potential of adding wireless capabilities for comprehensive security testing.

article thumbnail

Friday Squid Blogging: Biology and Ecology of the Colossal Squid

Schneier on Security

Good survey paper. Blog moderation policy.

173
173
article thumbnail

Addressing BYOD Vulnerabilities in the Workplace

Security Boulevard

Secure the workplace of today by exploring how to address BYOD vulnerabilities Bring Your Own Device (BYOD) policies have become commonplace in many workplaces. Employees use personal smartphones, tablets, and laptops to access corporate resources, blending work and personal activities on the same device. While BYOD offers several benefits, it also introduces significant cybersecurity vulnerabilities.

article thumbnail

4.8 million healthcare records left freely accessible

Malwarebytes

Your main business is healthcare, so your excuse when you get hacked is that you didnt have the budget to secure your network. Am I right? So, in order to prevent a ransomware gang from infiltrating your network, you could just give them what they wantall your data. The seemingly preferred method to accomplish this is to leave the information unprotected and unencrypted in an exposed Amazon S3 bucket.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.