Mon.Jul 15, 2024

article thumbnail

Hacking Scientific Citations

Schneier on Security

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors’ names, publication year, journal or conference name, and page numbers of the cited publication. These details are stored as metadata, not visible in the article’s text directly, but assigned to a digital object identifier, or DOI—a unique identifier for each sci

Hacking 331
article thumbnail

Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks

Krebs on Security

At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still haven’t set up their new accounts. Experts say malicious hackers learned they could commandeer any migrated Squarespace accounts that hadn’t yet been registered, merely by supplying an email address tied to an existing domain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Study shows most folks haven’t considered bequeathing their ‘digital’ inheritances

The Last Watchdog

In our digital age, managing passwords effectively is crucial not just for our security while we’re alive, but also for ensuring our digital legacies are secure after we’re gone. Related : Understanding digital footprints A recent study by All About Cookies sheds light on the alarming lack of preparation most internet users have for their digital assets.

article thumbnail

Ransomware groups target Veeam Backup & Replication bug

Security Affairs

Multiple ransomware groups were spotted exploiting a vulnerability, tracked as CVE-2023-27532, in Veeam Backup & Replication. The vulnerability CVE-2023-275327 (CVSS score of 7.5) impacts the Veeam Backup & Replication component. An attacker can exploit the issue to obtain encrypted credentials stored in the configuration database, potentially leading to gaining access to the backup infrastructure hosts.

Backups 140
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Facebook ads for Windows desktop themes push info-stealing malware

Bleeping Computer

Cybercriminals use Facebook business pages and advertisements to promote fake Windows themes that infect unsuspecting users with the SYS01 password-stealing malware. [.

Malware 138
article thumbnail

AT&T paid a $370,000 ransom to prevent stolen data from being leaked

Security Affairs

Wired attributes the recently disclosed AT&T data breach to a hacker living in Turkey and reported the company paid a $370,000 ransom. An American hacker who lives in Turkey claimed responsibility for the recently disclosed AT&T data breach. The man also said the company paid a ransom to ensure that stolen data would be deleted, reported Wired.

More Trending

article thumbnail

What Happens When Scammers Get Their Hands on Artificial Intelligence?

Security Boulevard

AI-powered scams are becoming increasingly sophisticated, making distinguishing between legitimate and fraudulent communications harder. Learn about the different types of AI scams, their risks, and how to protect yourself from falling victim. The post What Happens When Scammers Get Their Hands on Artificial Intelligence? appeared first on Security Boulevard.

article thumbnail

Kaspersky is shutting down its business in the United States

Bleeping Computer

Russian cybersecurity company and antivirus software provider Kaspersky Lab will start shutting down operations in the United States on July 20. [.

Antivirus 142
article thumbnail

GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks

The Hacker News

Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF) repositories. JFrog, which found the GitHub Personal Access Token, said the secret was leaked in a public Docker container hosted on Docker Hub.

Software 125
article thumbnail

How U.S. Businesses can Fight the Deepfake Threat 

Security Boulevard

While it's unclear how new, advanced technologies like AI and ML will ultimately change the data security landscape, now is not the time to stand still. The post How U.S. Businesses can Fight the Deepfake Threat appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

June Windows Server updates break Microsoft 365 Defender features

Bleeping Computer

Microsoft has confirmed that Windows Server updates from last month's Patch Tuesday break some Microsoft 365 Defender features that use the network data reporting service. [.

125
125
article thumbnail

Critical Vulnerability Discovered in OpenSSH Impacting Large User

Security Boulevard

In a significant development for cybersecurity, a new vulnerability has been detected in OpenSSH, the widely-used suite for secure network communications. This flaw poses a serious risk, potentially allowing malicious actors to remote code execution on affected systems. Understanding and mitigating this OpenSSH vulnerability is essential for secure data transfers and remote server management globally. […] The post Critical Vulnerability Discovered in OpenSSH Impacting Large User appeared first o

Risk 124
article thumbnail

Kaspersky Exits U.S. Market Following Commerce Department Ban

The Hacker News

Russian security vendor Kaspersky has said it's exiting the U.S. market nearly a month after the Commerce Department announced a ban on the sale of its software in the country citing a national security risk. News of the closure was first reported by journalist Kim Zetter. The company is expected to wind down its U.S. operations on July 20, 2024, the same day the ban comes into effect.

Marketing 122
article thumbnail

Olympic Gold at Risk: AI Cybercriminals Target 2024 Games.

Security Boulevard

The Summer Olympic Games will be held in Paris this year, and while the athletes will be focused on breaking world records, there are plenty of opportunistic cyberthreat actors who will be focused on breaking into the event’s complex, fragmented digital environment. The post Olympic Gold at Risk: AI Cybercriminals Target 2024 Games. appeared first on Security Boulevard.

Risk 123
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Singapore Banks to Phase Out OTPs for Online Logins Within 3 Months

The Hacker News

Retail banking institutions in Singapore have three months to phase out the use of one-time passwords (OTPs) for authentication purposes when signing into online accounts to mitigate the risk of phishing attacks. The decision was announced by the Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS) on July 9, 2024.

Banking 122
article thumbnail

Disney hacked? NullBulge claims to have stolen 1.1 TB of data from internal Slack channels

Graham Cluley

A group of hacktivists claims to have breached the IT systems of Disney, and stolen a gigantic 1.1 terabytes worth of data from the entertainment giant's internal Slack messaging channels. The hacking group, which calls itself NullBulge, posted on an underground hacking forum that it had hoped to postpone announcing the breach until it had accessed more information, "but our insider man got cold feet and kicked us out.

Hacking 114
article thumbnail

10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit

The Hacker News

Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit.

article thumbnail

Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages

WIRED Threat Level

A hacker group called “NullBulge” says it stole more than a terabyte of Disney’s internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art.

Hacking 108
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Hello, is it me you’re looking for? How scammers get your phone number

We Live Security

Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters.

109
109
article thumbnail

CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool

The Hacker News

A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over 1,500 victims.

Software 115
article thumbnail

U.S. Commerce Department Bans Kaspersky Cybersecurity Products

SecureWorld News

The U.S. Commerce Department has announced a full ban on the sale of Kaspersky products in the United States, effective July 20, 2024. Kaspersky, a prominent cybersecurity company based in Moscow, Russia, has been at the center of controversy due to alleged ties with the Russian government. The announcement marks a critical juncture for cybersecurity professionals across the country.

article thumbnail

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data.

Software 102
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks

Bleeping Computer

The SEXi ransomware operation, known for targeting VMware ESXi servers, has rebranded under the name APT INC and has targeted numerous organizations in recent attacks. [.

article thumbnail

CVE-2024-6695 (CVSS 9.8) in Popular WordPress Plugin Exposes 50,000 Sites to Admin Hijacking

Penetration Testing

Security researcher John Castro has uncovered a critical vulnerability (CVE-2024-6695) in Profile Builder, a widely used WordPress plugin with over 50,000 active installations. This flaw, rated 9.8 on the CVSS scale, could potentially allow... The post CVE-2024-6695 (CVSS 9.8) in Popular WordPress Plugin Exposes 50,000 Sites to Admin Hijacking appeared first on Cybersecurity News.

article thumbnail

Ransomware and Cyber Extortion in Q2 2024

Digital Shadows

ReliaQuest identified a 20% rise in ransomware-affected organizations in Q2 2024. Despite disruptions, new groups are increasing activity.

article thumbnail

Expanded Identity Security With Duo Single Sign-On: Duo Adds Support for OAuth 2.0 Client Credentials

Duo's Security Blog

As identity-based attacks become more prevalent, the ability to fine-tune access at a granular level is not just an advantage — it's a necessity. Duo has been born at the forefront of this shift, offering SAML support since 2015 and OIDC since 2023, which has helped many of our customers secure applications with Duo’s best-in-class identity security controls.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Teaming up with IBM to secure critical SAP workloads

Trend Micro

Trend Micro partners with IBM to offer advanced threat detection and response for protecting critical infrastructures running on IBM Power servers

article thumbnail

CVE-2024-36401 (CVSS 9.8): Critical GeoServer Flaw Under Active Attack, PoC Available

Penetration Testing

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability in OSGeo GeoServer GeoTools, a widely-used open-source software server for geospatial data. This flaw, identified as CVE-2024-36401,... The post CVE-2024-36401 (CVSS 9.8): Critical GeoServer Flaw Under Active Attack, PoC Available appeared first on Cybersecurity News.

article thumbnail

New BugSleep malware implant deployed in MuddyWater attacks

Bleeping Computer

The Iranian-backed MuddyWatter hacking group has partially switched to using a new custom-tailored malware implant to steal files and run commands on compromised systems. [.

Malware 82
article thumbnail

Security Flaw CVE-2024-6345 in Setuptools Exposes Python Projects to RCE

Penetration Testing

A severe security vulnerability has been identified in Setuptools, a widely-used library for packaging, distributing, and installing Python projects. This flaw, designated CVE-2024-6345 with a CVSS score of 8.8, exposes systems to remote code... The post Security Flaw CVE-2024-6345 in Setuptools Exposes Python Projects to RCE appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.