Thu.Jun 20, 2024

article thumbnail

Recovering Public Keys from Signatures

Schneier on Security

Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead have a message and a signature, assume the signature is valid, and want to know which public key signed it? A rather delightful property if you want to attack anonymity in some proposed “everybody just uses cryptographic signatures for everything” scheme.

283
283
article thumbnail

RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments

The Last Watchdog

CISOs have been on something of a wild roller coaster ride the past few years. Related: Why breaches persist When Covid 19 hit in early 2020, the need to secure company networks in a new way led to panic spending on cybersecurity tools. Given carte blanche, many CISOs purchased a hodge podge of unproven point solutions, adding to complexity. By mid-2022, with interest rates climbing and the stock market cratering, CFOs began demanding proof of a reasonable return on investment.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Bans Kaspersky Software, Citing National Security Risks

The Hacker News

The U.S. Department of Commerce's Bureau of Industry and Security (BIS) on Thursday announced a "first of its kind" ban that prohibits Kaspersky Lab's U.S. subsidiary from directly or indirectly offering its security software in the country.

Software 136
article thumbnail

An unpatched bug allows anyone to impersonate Microsoft corporate email accounts

Security Affairs

A researcher discovered a flaw that allows attackers to impersonate Microsoft corporate email accounts and launch phishing attacks. The security researcher Vsevolod Kokorin (@Slonser) discovered a bug that allows anyone to impersonate Microsoft corporate email accounts. An attacker can trigger the vulnerability to launch phishing attacks. I want to share my recent case: > I found a vulnerability that allows sending a message from any user@domain > We cannot reproduce it > I send a v

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs

The Hacker News

Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.

Firmware 132
article thumbnail

Biden bans Kaspersky antivirus software in US over security concerns

Bleeping Computer

Today, the Biden administration has announced an upcoming ban of Kaspersky antivirus software and the pushing of software updates to US companies and consumers, giving customers until September 29, 2024, to find alternative security software. [.

Antivirus 129

More Trending

article thumbnail

Dodgy disks. My 32TB SSD Adventure

Pen Test Partners

TL;DR “Hard drive” had reflashed firmware to make it look larger Buyer beware: Cheap storage may not be the value you think it is Background Earlier this year I found myself in need of various cheap electronic components. So naturally I turned to AliExpress. I came across a listing for a cheap “32TB Portable SSD”. I knew this was too good to be true but at £21 I thought it would be interesting to take a look at what I actually got.

article thumbnail

Phoenix UEFI vulnerability impacts hundreds of Intel PC models

Bleeping Computer

A newly discovered vulnerability in Phoenix SecureCore UEFI firmware tracked as CVE-2024-0762 impacts devices running numerous Intel CPUs, with Lenovo already releasing new firmware updates to resolve the flaw. [.

Firmware 125
article thumbnail

Surfshark vs Norton Secure VPN (2024): Which VPN Is Better?

Tech Republic Security

Which VPN is better, Norton Secure VPN or Surfshark? Use our guide to compare pricing, features and more.

VPN 150
article thumbnail

Atlassian fixed six high-severity bugs in Confluence Data Center and Server

Security Affairs

Australian software company Atlassian addressed multiple high-severity vulnerabilities in its Confluence, Crucible, and Jira solutions. Atlassian June 2024 Security Bulletin addressed nine high-severity vulnerabilities in Confluence, Crucible, and Jira products. The most severe issue addressed by the company is an improper authorization org.springframework.security:spring-security-core dependency in Confluence Data Center and Server.

Software 134
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Qilin ransomware: What you need to know

Graham Cluley

Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid. Read more in my article on the Tripwire State of Security blog.

article thumbnail

China-linked spies target Asian Telcos since at least 2021

Security Affairs

A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. The Symantec Threat Hunter Team reported that an alleged China-linked APT group has infiltrated several telecom operators in a single, unnamed, Asian country at least since 2021. The threat actors used tools associated with Chinese espionage groups, they planted multiple backdoors on the networks of targeted companies to steal credentials. “The attacks have been underway since a

DNS 135
article thumbnail

Cato Networks Launches SASE Platform for Partners

Security Boulevard

Cato Networks today launched a framework for IT services partners that promises to make it simple to integrate its secure access service edge (SASE) service with third-party services. The post Cato Networks Launches SASE Platform for Partners appeared first on Security Boulevard.

article thumbnail

New Rust infostealer Fickle Stealer spreads through various attack methods

Security Affairs

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration A new Rust malware called Fickle Stealer spreads through various attack methods and steals sensitive information. Fortinet FortiGuard Labs researchers detected a new Rust-based information stealer called Fickle Stealer which spread through multiple attack vectors. The malware has an intricate code and relies on multiple strategies for its distribution, including VBA dropper, VBA downloader, link downloader, and ex

Malware 133
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cloud Penetration Testing: A Detailed Step-by-Step Guide

Security Boulevard

As businesses increasingly migrate to the cloud, ensuring the security of cloud infrastructure becomes paramount. Cloud security testing, particularly cloud penetration testing, is critical to identifying and mitigating security vulnerabilities within your cloud environments. This detailed guide will walk you through the process of conducting effective cloud penetration testing.

article thumbnail

Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021

The Hacker News

Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators located in a single Asian country at least since 2021.

121
121
article thumbnail

CosmicSting (CVE-2024-34102): A Critical E-Commerce Vulnerability Threatening Millions of Online Stores

Penetration Testing

A newly discovered vulnerability dubbed “CosmicSting” (CVE-2024-34102) has sent shockwaves through the e-commerce world, potentially jeopardizing millions of online stores built on Adobe Commerce and Magento platforms. With nearly three-quarters of affected sites yet... The post CosmicSting (CVE-2024-34102): A Critical E-Commerce Vulnerability Threatening Millions of Online Stores appeared first on Cybersecurity News.

article thumbnail

Navigating the Aftermath of the Ticketmaster Breach

Security Boulevard

The post Navigating the Aftermath of the Ticketmaster Breach appeared first on Votiro. The post Navigating the Aftermath of the Ticketmaster Breach appeared first on Security Boulevard.

116
116
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

CDK Global hacked again while recovering from first cyberattack

Bleeping Computer

Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore systems shut down in an previous cyberattack. [.

Hacking 120
article thumbnail

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration

The Hacker News

A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of harvesting sensitive information from compromised hosts.

Malware 117
article thumbnail

UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs

Bleeping Computer

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on VMware ESXi virtual machines, allowing them to conduct credential theft, command execution, and lateral movement. [.

115
115
article thumbnail

Ransomware attacks skyrocket, with LockBit 3.0 at the forefront

Graham Cluley

Newly-released research indicates that ransomware attacks reached a record high in May, with the surge primarily fueled by a massive increase in the number of attacks perpetrated by the LockBit ransomware group and its affiliates. Read more in my article on the Exponential-e blog.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Linux version of RansomHub ransomware targets VMware ESXi VMs

Bleeping Computer

The RansomHub ransomware operation is using a Linux encryptor designed specifically to encrypt VMware ESXi environments in corporate attacks. [.

article thumbnail

Keeper vs Bitwarden (2024): Benefits & Features Compared

eSecurity Planet

Keeper and Bitwarden are password manager products that help your business manage its application credentials across all platforms. Keeper is a strong solution for both small businesses and large enterprises. Bitwarden is great for mid-sized businesses and teams that want to self-host a password manager. I evaluated Keeper and Bitwarden’s features, business plans, and pros and cons so you can decide which solution is a better fit for your organization.

article thumbnail

PrestaShop Sites Under Attack via Facebook Module Vulnerability (CVE-2024-36680)

Penetration Testing

A critical vulnerability in a popular PrestaShop module, “Facebook” (pkfacebook) by Promokit.eu, has been discovered and is being actively exploited by cybercriminals to deploy web skimmers and steal credit card data. The vulnerability, identified... The post PrestaShop Sites Under Attack via Facebook Module Vulnerability (CVE-2024-36680) appeared first on Cybersecurity News.

article thumbnail

Battling Burnout: A Growing Concern for CISOs and Security Professionals

SecureWorld News

As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. This phenomenon is not just anecdotal; several studies have highlighted the alarming prevalence of burnout in the cybersecurity industry. A new report out Tuesday by Hack The Box has found that enterprises are losing approximately $626 million in lost productivity due to security practitioners feeling the squeeze on their mental health.

CISO 106
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks

The Hacker News

State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities, the country's information security agency ANSSI said in an advisory.

article thumbnail

Smishing Triad Is Targeting Pakistan To Defraud Banking Customers At Scale

Security Affairs

Resecurity researchers warn of a new activity of Smishing Triad , which has expanded its operations to Pakistan. Resecurity has identified a new activity of Smishing Triad , which has expanded its operations to Pakistan. The group’s latest tactic involves sending malicious messages on behalf of Pakistan Post to customers of mobile carriers via iMessage/SMS.

Banking 120
article thumbnail

Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024

The Hacker News

Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but lack integration.

article thumbnail

CHOROLOGY Emerges to Apply Generative AI to Data Governance

Security Boulevard

CHOROLOGY.ai today emerged from stealth to apply generative artificial intelligence (AI) to data governance. The post CHOROLOGY Emerges to Apply Generative AI to Data Governance appeared first on Security Boulevard.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.