Fri.Dec 13, 2024

article thumbnail

Ultralytics Supply-Chain Attack

Schneier on Security

Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary : On December 4, a malicious version 8.3.41 of the popular AI library ultralytics —which has almost 60 million downloads—was published to the Python Package Index (PyPI) package repository. The package contained downloader code that was downloading the XMRig coinminer.

247
247
article thumbnail

Australian IT Pros Urged to Guard Against Chinese Cybersecurity Threats

Tech Republic Security

Australian IT pros are urged to strengthen defenses as Chinese cyber threats target critical infrastructure and sensitive data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

The Hacker News

Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files and directories, and conceal itself from system tools, while simultaneously evading detection.

article thumbnail

Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors

Security Boulevard

An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on the dark web. The post Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors appeared first on Security Boulevard.

Malware 111
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

The Hacker News

A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials.

article thumbnail

Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight

Security Boulevard

By focusing on prioritized, actionable insights, security teams can keep pace with the rapid expansion of the attack surface, manage frequent changes across their digital infrastructure and proactively address evolving attack tactics, techniques and procedures (TTPs). The post Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Video: How Two Crypto Scammers Stole $230 Million in Bitcoin

eSecurity Planet

This video covers Malone Lam and Jeandiel Serranos $230 million Bitcoin heist that involved using social engineering to bypass security. The scammers spent the stolen funds on luxury items but were caught after bragging online. Our expert highlights the risks of social engineering and the need for strong online security. The post Video: How Two Crypto Scammers Stole $230 Million in Bitcoin appeared first on eSecurity Planet.

article thumbnail

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

The Hacker News

Iran-affiliated threat actors have been linked to a new custom malware that's geared toward IoT and operational technology (OT) environments in Israel and the United States.

IoT 109
article thumbnail

U.S. authorities seized cybercrime marketplace Rydox

Security Affairs

The U.S. Department of Justice (DoJ) announced the seizure of the cybercrime marketplace Rydox (“rydox.ru” and “rydox[.]cc”). The U.S. Department of Justice (DoJ) seized Rydox, a cybercrime marketplace for selling stolen personal data and fraud tools. Kosovars authorities arrested three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli.

article thumbnail

The New Jersey Drone Mystery May Not Actually Be That Mysterious

WIRED Threat Level

A flurry of drone sightings across New Jersey and New York has sparked national intrigue and US government responses. But experts are pouring cold water on Americas hottest new conspiracy theory.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to Generate a CrowdStrike RFM Report With AI in Tines

The Hacker News

Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual You Did What with Tines?!

94
article thumbnail

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

We Live Security

Our computers on wheels are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow.

Hacking 93
article thumbnail

Ransomware in the Global Healthcare Industry  

Security Boulevard

Healthcare organizations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences. The post Ransomware in the Global Healthcare Industry appeared first on Security Boulevard.

article thumbnail

The best streaming mics of 2025: Expert tested

Zero Day

Looking for a high-quality microphone to start your podcast, or do you just need a reliable mic for Discord and work calls? We tested the best streaming mics from Shure, SteelSeries, and more.

81
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Human Misuse Will Make Artificial Intelligence More Dangerous

WIRED Threat Level

AI creates what its told to, from plucking fanciful evidence from thin air, to arbitrarily removing peoples rights, to sowing doubt over public misdeeds.

article thumbnail

Over 15,000 Sites at Risk: Woffice WordPress Theme Vulnerabilities Could Lead to Full Site Takeovers

Penetration Testing

Patchstack has disclosed two critical vulnerabilities in the widely used Woffice WordPress theme, a premium intranet/extranet solution with over 15,000 sales. Developed by Xtendify, the Woffice theme offers team and... The post Over 15,000 Sites at Risk: Woffice WordPress Theme Vulnerabilities Could Lead to Full Site Takeovers appeared first on Cybersecurity News.

Risk 72
article thumbnail

As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global

WIRED Threat Level

The white supremacist Robert Rundo faces years in prison. But the Active Club network he helped create has proliferated in countries around the world, from Eastern Europe to South America.

70
article thumbnail

DCOM Upload & Execute: A New Backdoor Technique Unveiled

Penetration Testing

Deep Instinct Security Researcher Eliran Nissan has uncovered a new and potent lateral movement technique, DCOM Upload & Execute, redefining how attackers might exploit Distributed Component Object Model (DCOM) interfaces... The post DCOM Upload & Execute: A New Backdoor Technique Unveiled appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

We Live Security

Aggregate vulnerability scores dont tell the whole story the relationship between a flaws public severity rating and the specific risks it poses for your company is more complex than it seems

Risk 66
article thumbnail

Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication

Penetration Testing

Kaspersky Labs has unveiled research on the return of “The Mask,” also known as Careto, a legendary Advanced Persistent Threat (APT) actor. After a decade-long silence since its last known... The post Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication appeared first on Cybersecurity News.

article thumbnail

Thales and Imperva Win Big in 2024

Thales Cloud Protection & Licensing

Thales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 - 08:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesnt mean we dont appreciate winning the occasional award. In the year since Imperva joined forces with Thales, lets review the cybersecurity industry accolades and recognition weve both received this year.

InfoSec 62
article thumbnail

Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions

Security Boulevard

The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions. Anyone can make predictions (and far too many do), but actually being correct is another matter altogether. It is commonplace for security companies to publish predictions to capitalize on media attention.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management

Hacker Combat

Cyber threats can wreak havoc on businesses, from data breaches to loss of reputation. Luckily, there are effective strategies available that can reduce cybersecurity risk. Avoidance is one of the. The post Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management appeared first on Hacker Combat.

Risk 59
article thumbnail

Digital Finance: How Do Banks Protect Their Customers’ Money and Data from Cybercriminals?

Security Boulevard

Cybercriminals are employing increasingly sophisticated methods to access our money and data, making this issue particularly relevant for large European banks, where significant financial assets are concentrated. The post Digital Finance: How Do Banks Protect Their Customers Money and Data from Cybercriminals? appeared first on Security Boulevard.

Banking 59
article thumbnail

German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox

Security Affairs

The German agency BSI has sinkholed a botnet composed of 30,000 devices shipped with BadBox malware pre-installed. The Federal Office for Information Security (BSI) announced it had blocked communication between the 30,000 devices infected with the BadBox malware and the C2. The devices were all located in Germany, they were all using outdatedAndroidversions. “The Federal Office for Information Security (BSI) has now blocked communication between the malware and the computer in up to 30,00

article thumbnail

5 Critical Questions to Ask When Evaluating MDR Solutions

Digital Shadows

With the ever-growing cybersecurity threats companies face today and a shortage of cybersecurity talent, its no wonder that many are turning to MDR solutions. Ideally, managed detection and response providers can help companies tackle problems like overburdened security teams, lack of expertise in cloud security, or alert noise. Choosing the right MDR provider for your organization is crucial, so its important to evaluate their capabilities before committing.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Feeling Reassured with Top-Tier API Security Measures

Security Boulevard

Are You Maximizing Your API Security Measures? If youre a CISO or a cybersecurity professional, you understand the importance of robust API security measures. But, do these measures ensure optimum protection when non-human identities (NHIs) are involved? The disconnect between security and R&D teams can lead to exploitable gaps in API security. A comprehensive approach [] The post Feeling Reassured with Top-Tier API Security Measures appeared first on Entro.

CISO 52
article thumbnail

HTML Smuggling To Bypass Restrictions On Certain Files

Hacker's King

Security scanners are now available on every web server, computer, and even personal smartphone. However, do they truly provide protection against malicious files? The answer is simple: "Cybersecurity consists of 70% system and 30% human knowledge." This means that users must also be educated about computer and internet security. You may also like to read: TGPT AI Chatbot For Your Linux Terminal In this blog, we will explore a method used by attackers to bypass scanners and send malicious files

article thumbnail

How Can Strong Secrets Management Prevent Data Breaches

Security Boulevard

Is Your Secrets Management Strong Enough to Prevent Data Breaches? In an increasingly connected digital world, secrets management has emerged as a critical component of cybersecurity. How can strong secrets management prevent data breaches, and why should it be a priority for organizations operating in the cloud? The Power of Non-Human Identities and Secrets A [] The post How Can Strong Secrets Management Prevent Data Breaches appeared first on Entro.

article thumbnail

What is gRPC and How Does it Enhance API Security?

IT Security Guru

As the reliance on APIs grows, so do the challenges of ensuring they are both fast and secure. Enter gRPC a high-performance, open-source framework that has revolutionised how systems communicate in real time. More than just a tool for building APIs, gRPC brings an added layer of efficiency and robust security features to the table. With its advanced protocol and streamlined architecture, gRPC is transforming the way developers tackle API vulnerabilities while maintaining lightning-fast perform

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!