Sat.Nov 18, 2023

article thumbnail

Israeli man sentenced to 80 months in prison for providing hacker-for-hire services

Security Affairs

An Israeli hacker has been sentenced to 80 months in prison in the US for his role in a massive spear-phishing campaign. Aviram Azari (52) was sentenced to 80 months in prison for computer intrusion, wire fraud, and aggravated identity theft in connection with his involvement in a massive spear-phishing campaign targeting companies and individuals in the U.S. and around worldwide.

article thumbnail

Google shares plans for blocking third-party cookies in Chrome

Bleeping Computer

Google has officially announced plans to gradually eliminate third-party cookies, a key aspect of its Privacy Sandbox initiative. [.

Software 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine

Security Affairs

Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB. Check Point researchers observed Russia-linked Gamaredon spreading the worm called LitterDrifter via USB in attacks against Ukraine. Gamaredon (aka Shuckworm, Actinium, Armageddon, Primitive Bear, UAC-0010, and Trident Ursa) has been active since 2014 and its activity focuses on Ukraine, the group was observed using the multistage backdoor Pteranodon / Pterodo.

Malware 139
article thumbnail

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The Hacker News

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Exploit for CrushFTP RCE chain released, patch now

Bleeping Computer

A proof-of-concept exploit was publicly released for a critical remote code execution vulnerability in the CrushFTP enterprise suite, allowing unauthenticated attackers to access files on the server, execute code, and obtain plain-text passwords. [.

article thumbnail

The Startup That Transformed the Hack-for-Hire Industry

WIRED Threat Level

Plus: The FBI's baffling inaction on a ransomware group, a massive breach of Danish electric utilities, and more.

Hacking 84

More Trending

article thumbnail

Inside the Race to Secure the F1 Las Vegas Grand Prix

WIRED Threat Level

Beyond the blinding speeds and sharp turns on new terrain, the teams at this weekend’s big F1 race are preparing for another kind of danger.

Hacking 80
article thumbnail

Windows 10 to let admins control how optional updates are deployed

Bleeping Computer

Microsoft announced a new policy that allows admins to control how optional updates are deployed on Windows 10 enterprise endpoints on their networks. [.

73
article thumbnail

Network Segmentation Guide: Essential Security Best Practices Revealed

Security Boulevard

Unlocking the Power of Network Segmentation: A Comprehensive Guide for Enhanced Security In the dynamic world of cybersecurity, network segmentation emerges as a pivotal strategy for safeguarding digital assets. This practice involves dividing a computer network into smaller, distinct segments or subnets. Each subnet acts as a separate entity, enhancing security and control within the … Network Segmentation Guide: Essential Security Best Practices Revealed Read More » The post Network Segmentati

article thumbnail

PoC Code for Linux Kernel Privilege Escalation Flaw (CVE-2023-259) Published

Penetration Testing

Cybersecurity researcher Yordan has released the details, and a proof-of-concept (PoC) exploit for a high-severity vulnerability (CVE-2023-2598, CVSS score of 7.8) that exists in Linux kernel 6.3-rc1. Discovered by white hat hacker Tobias Holl,... The post PoC Code for Linux Kernel Privilege Escalation Flaw (CVE-2023-259) Published appeared first on Penetration Testing.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.