Thu.Jan 04, 2024

article thumbnail

New iPhone Exploit Uses Four Zero-Days

Schneier on Security

Kaspersky researchers are detailing “an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky.” It’s a zero-click exploit that makes use of four iPhone zero-days. The most intriguing new detail is the targeting of the heretofore-unknown hardware feature, which proved to be pivotal to the Operation Triangulation campaign.

Spyware 358
article thumbnail

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Tech Republic Security

Investment firm DigitalBridge Group and other backers provided the cash for the venture, which will enable generative AI deployment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook introduces another way to track you – Link History

Malwarebytes

In what seems like yet another attempt to adapt its platform to prepare for new regulations, Facebook has started rolling out a new feature called Link History. Link History allows users to view and re-visit links they have visited with their Facebook browsing activity. Obviously Facebook will tell us that the new feature is for its users’ benefit, but we can see several ways in which this benefits Meta even more.

Mobile 145
article thumbnail

EDRSilencer: uses WFP to block EDR agents from reporting security events to the server

Penetration Testing

EDRSilencer Inspired by the closed-source FireBlock tool FireBlock from MdSec NightHawk, I created my version. This tool was created to block the outbound traffic of running EDR processes using Windows Filtering Platform (WFP) APIs.... The post EDRSilencer: uses WFP to block EDR agents from reporting security events to the server appeared first on Penetration Testing.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

HealthEC data breach impacted more than 4.5 Million people

Security Affairs

Healthcare technology company HealthEC disclosed a data breach that exposed the personal information of 4.5 million Individuals. Healthcare technology company HealthEC (HEC) disclosed a data breach that impacted 4.5 million customers of its business partners. HealthEC is a healthcare technology company that provides solutions for care coordination, population health management, and value-based care.

article thumbnail

Cryptocurrency wallet CEO loses $125,000 in wallet-draining scam

Graham Cluley

No one is too big, too clever, too security-savvy to avoid being duped - because it's only human to make a mistake and screw up. Read my article on the Tripwire State of Security blog.

More Trending

article thumbnail

To Beat Russia, Ukraine Needs a Major Tech Breakthrough

WIRED Threat Level

Ukraine’s top general says his country must innovate on the level of inventing gunpowder to “break military parity” with Russia. If it’s successful, it could change the future of war.

134
134
article thumbnail

Crooks hacked Mandiant X account to push cryptocurrency scam

Security Affairs

The X account of cybersecurity giant Mandiant was hacked, attackers used it to impersonate the Phantom crypto wallet and push a cryptocurrency scam. Crooks hacked the X account of cybersecurity firm Mandiant and used it to impersonate the Phantom crypto platform and share a cryptocurrency scam. Today Mandiant had their Twitter account stolen. 2024 starting strong pic.twitter.com/gHagm2o36q — vx-underground (@vxunderground) January 3, 2024 The X account of the Google-owned firm Mandiant has

article thumbnail

Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools

Security Boulevard

More than half of cybersecurity leaders would replace their entire current stack of platforms if there were no budget constraints. The post Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools appeared first on Security Boulevard.

article thumbnail

Hacker hijacked Orange Spain RIPE account causing internet outage to company customers

Security Affairs

An internet outage impacted Orange Spain after a hacker gained access to the company’s RIPE account to misconfigure BGP routing. The hacker, who uses the moniker ‘Snow’, gained access to the RIPE account of Orange Spain and misconfigured the BGP routing causing an internet outage. The customers of the company were not able to access the internet for several hours on January 3 as a result of the attack.

Internet 137
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cyber Professional Barbie: The Importance of Embracing Diversity in Cybersecurity

Jane Frankland

Growing up, most women had a Barbie in their lives at some point. Whether you found her artfully arranged on the toy shelf or covered in ‘dirt’ and tucked away, Barbie has played a significant role in shaping many people’s perceptions and aspirations. In this blog, I’ll be delving into how Barbie continues to influence people, particularly women.

article thumbnail

'everything' blocks devs from removing their own npm packages

Bleeping Computer

Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called "everything," and others named a variation of the word. These 3,000+ packages make it impossible for all npm authors to unpublish their packages from the registry. [.

129
129
article thumbnail

Resecurity Identifies AI Tool Being Used to Compromise Business Email

Security Boulevard

Resecurity revealed the GXC Team cybercriminal syndicate developed a tool that uses AI to generate invoices that are embedded within a BEC attack. The post Resecurity Identifies AI Tool Being Used to Compromise Business Email appeared first on Security Boulevard.

article thumbnail

Resolve to Automate Your Certificate Management in 2024

GlobalSign

Let’s look at how to improve SSL/TLS certificate management through automation and how Atlas Discovery solution can help.

122
122
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Stinger: UAC bypass implementation of Stinger

Penetration Testing

Stinger CIA Vault7 leak describes Stinger as a Privilege Escalation module in the “Fine Dining” toolset. Stinger is a “UAC bypass that obtains the token from an auto-elevated process, modifies it, and reuses it... The post Stinger: UAC bypass implementation of Stinger appeared first on Penetration Testing.

article thumbnail

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

The Hacker News

Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices. The three harmful packages, named modularseven, driftme, and catme, attracted a total of 431 downloads over the past month before they were taken down.

article thumbnail

Lost and found: How to locate your missing devices and more

We Live Security

Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy

110
110
article thumbnail

Alert: Ivanti Releases Patch for Critical Vulnerability in Endpoint Manager Solution

The Hacker News

Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager (EPM) solution that, if successfully exploited, could result in remote code execution (RCE) on susceptible servers. Tracked as CVE-2023-39336, the vulnerability has been rated 9.6 out of 10 on the CVSS scoring system. The shortcoming impacts EPM 2021 and EPM 2022 prior to SU5.

110
110
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Hackers hijack govt and business accounts on X for crypto scams

Bleeping Computer

Hackers are increasingly targeting verified accounts on X (formerly Twitter) belonging to government and business profiles and marked with 'gold' and 'grey' checkmarks to promote cryptocurrency scams. [.

Scams 109
article thumbnail

New Bandook RAT Variant Resurfaces, Targeting Windows Machines

The Hacker News

A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an aim to infiltrate Windows machines, underscoring the continuous evolution of the malware. Fortinet FortiGuard Labs, which identified the activity in October 2023, said the malware is distributed via a PDF file that embeds a link to a password-protected.7z archive.

Phishing 110
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. UAM systems operate by installing a software agent on each employee's computer. This agent gathers data about the user's actions, such as keystrokes, mouse clicks, application usage, and internet activity.

article thumbnail

Three Ways To Supercharge Your Software Supply Chain Security

The Hacker News

Section four of the "Executive Order on Improving the Nation’s Cybersecurity" introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this.

Software 109
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Russian hackers wiped thousands of systems in KyivStar attack

Bleeping Computer

The Russian hackers behind a December breach of Kyivstar, Ukraine's largest telecommunications service provider, have wiped all systems on the telecom operator's core network. [.

article thumbnail

Russian Hackers Had Covert Access to Ukraine's Telecom Giant for Months

The Hacker News

Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar's systems at least since May 2023. The development was first reported by Reuters.

Mobile 109
article thumbnail

What To Look For in an Open Source Vulnerability Scanner

Veracode Security

One of the top security concerns we hear from technology leaders is about the security of open source software (OSS) and cloud software development. An open source vulnerability scanner (for scanning OSS) helps you discover risk in the third-party code you use. However, just because a solution scans open source does not mean you are ultimately reducing security risk with it.

Risk 105
article thumbnail

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

The Hacker News

The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade detection from security software.

Phishing 107
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

What is a Gift Card Draining Scam?

Identity IQ

What is a Gift Card Draining Scam? IdentityIQ If you gave or received a gift card this holiday season, you should be aware of gift card draining scams that can turn your gift into a disappointment. This article gives you an overview of how to safely enjoy gift cards and answers the burning question, “What is a gift card draining scam?” What is Gift Card Draining?

Scams 104
article thumbnail

Beware of LinkedIn: Ducktail Malware’s Sneaky ZIP Attack Revealed

Penetration Testing

In December 2023, the cybersecurity community was alerted to a new form of cyber threat – the Ducktail malware. This incident, detected by the eSentire Threat Response Unit (TRU), targeted a digital marketing professional,... The post Beware of LinkedIn: Ducktail Malware’s Sneaky ZIP Attack Revealed appeared first on Penetration Testing.

article thumbnail

Ivanti warns critical EPM bug lets hackers hijack enrolled devices

Bleeping Computer

Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack enrolled devices or the core server. [.

Software 103
article thumbnail

Teleport’s Security Breach: Centralized System Faces Critical Vulnerabilities

Penetration Testing

Teleport, a renowned platform offering centralized authentication and auditing for servers and cloud applications, has recently found itself in the cybersecurity spotlight. This platform, however, has multiple vulnerabilities, some of which are deemed ‘Critical‘ ... The post Teleport’s Security Breach: Centralized System Faces Critical Vulnerabilities appeared first on Penetration Testing.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.