Thu.Jan 04, 2024

article thumbnail

New iPhone Exploit Uses Four Zero-Days

Schneier on Security

Kaspersky researchers are detailing “an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky.” It’s a zero-click exploit that makes use of four iPhone zero-days. The most intriguing new detail is the targeting of the heretofore-unknown hardware feature, which proved to be pivotal to the Operation Triangulation campaign.

Spyware 352
article thumbnail

Cyber Professional Barbie: The Importance of Embracing Diversity in Cybersecurity

Jane Frankland

Growing up, most women had a Barbie in their lives at some point. Whether you found her artfully arranged on the toy shelf or covered in ‘dirt’ and tucked away, Barbie has played a significant role in shaping many people’s perceptions and aspirations. In this blog, I’ll be delving into how Barbie continues to influence people, particularly women.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook introduces another way to track you – Link History

Malwarebytes

In what seems like yet another attempt to adapt its platform to prepare for new regulations, Facebook has started rolling out a new feature called Link History. Link History allows users to view and re-visit links they have visited with their Facebook browsing activity. Obviously Facebook will tell us that the new feature is for its users’ benefit, but we can see several ways in which this benefits Meta even more.

Mobile 144
article thumbnail

Cryptocurrency wallet CEO loses $125,000 in wallet-draining scam

Graham Cluley

No one is too big, too clever, too security-savvy to avoid being duped - because it's only human to make a mistake and screw up. Read my article on the Tripwire State of Security blog.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

EDRSilencer: uses WFP to block EDR agents from reporting security events to the server

Penetration Testing

EDRSilencer Inspired by the closed-source FireBlock tool FireBlock from MdSec NightHawk, I created my version. This tool was created to block the outbound traffic of running EDR processes using Windows Filtering Platform (WFP) APIs.... The post EDRSilencer: uses WFP to block EDR agents from reporting security events to the server appeared first on Penetration Testing.

article thumbnail

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Tech Republic Security

Investment firm DigitalBridge Group and other backers provided the cash for the venture, which will enable generative AI deployment.

More Trending

article thumbnail

Experts found 3 malicious packages hiding crypto miners in PyPi repository

Security Affairs

Researchers discovered three malicious packages in the PyPI repository targeting Linux systems with a cryptocurrency miner. Fortinet researchers discovered three malicious packages in the open-source PyPI repository. The three packages named modularseven, driftme, and catme were designed to target Linux systems to deploy a crypto miner. The packages have the same author, known as “sastra”, who created a PyPI account shortly before uploading the first of them.

article thumbnail

'everything' blocks devs from removing their own npm packages

Bleeping Computer

Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called "everything," and others named a variation of the word. These 3,000+ packages make it impossible for all npm authors to unpublish their packages from the registry. [.

129
129
article thumbnail

HealthEC data breach impacted more than 4.5 Million people

Security Affairs

Healthcare technology company HealthEC disclosed a data breach that exposed the personal information of 4.5 million Individuals. Healthcare technology company HealthEC (HEC) disclosed a data breach that impacted 4.5 million customers of its business partners. HealthEC is a healthcare technology company that provides solutions for care coordination, population health management, and value-based care.

article thumbnail

Resecurity Identifies AI Tool Being Used to Compromise Business Email

Security Boulevard

Resecurity revealed the GXC Team cybercriminal syndicate developed a tool that uses AI to generate invoices that are embedded within a BEC attack. The post Resecurity Identifies AI Tool Being Used to Compromise Business Email appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Hacker hijacked Orange Spain RIPE account causing internet outage to company customers

Security Affairs

An internet outage impacted Orange Spain after a hacker gained access to the company’s RIPE account to misconfigure BGP routing. The hacker, who uses the moniker ‘Snow’, gained access to the RIPE account of Orange Spain and misconfigured the BGP routing causing an internet outage. The customers of the company were not able to access the internet for several hours on January 3 as a result of the attack.

Internet 131
article thumbnail

Hackers hijack govt and business accounts on X for crypto scams

Bleeping Computer

Hackers are increasingly targeting verified accounts on X (formerly Twitter) belonging to government and business profiles and marked with 'gold' and 'grey' checkmarks to promote cryptocurrency scams. [.

Scams 109
article thumbnail

Crooks hacked Mandiant X account to push cryptocurrency scam

Security Affairs

The X account of cybersecurity giant Mandiant was hacked, attackers used it to impersonate the Phantom crypto wallet and push a cryptocurrency scam. Crooks hacked the X account of cybersecurity firm Mandiant and used it to impersonate the Phantom crypto platform and share a cryptocurrency scam. Today Mandiant had their Twitter account stolen. 2024 starting strong pic.twitter.com/gHagm2o36q — vx-underground (@vxunderground) January 3, 2024 The X account of the Google-owned firm Mandiant has

article thumbnail

Russian hackers wiped thousands of systems in KyivStar attack

Bleeping Computer

The Russian hackers behind a December breach of Kyivstar, Ukraine's largest telecommunications service provider, have wiped all systems on the telecom operator's core network. [.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

What To Look For in an Open Source Vulnerability Scanner

Veracode Security

One of the top security concerns we hear from technology leaders is about the security of open source software (OSS) and cloud software development. An open source vulnerability scanner (for scanning OSS) helps you discover risk in the third-party code you use. However, just because a solution scans open source does not mean you are ultimately reducing security risk with it.

Risk 105
article thumbnail

Stinger: UAC bypass implementation of Stinger

Penetration Testing

Stinger CIA Vault7 leak describes Stinger as a Privilege Escalation module in the “Fine Dining” toolset. Stinger is a “UAC bypass that obtains the token from an auto-elevated process, modifies it, and reuses it... The post Stinger: UAC bypass implementation of Stinger appeared first on Penetration Testing.

article thumbnail

What is a Gift Card Draining Scam?

Identity IQ

What is a Gift Card Draining Scam? IdentityIQ If you gave or received a gift card this holiday season, you should be aware of gift card draining scams that can turn your gift into a disappointment. This article gives you an overview of how to safely enjoy gift cards and answers the burning question, “What is a gift card draining scam?” What is Gift Card Draining?

Scams 104
article thumbnail

Ivanti warns critical EPM bug lets hackers hijack enrolled devices

Bleeping Computer

Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack enrolled devices or the core server. [.

Software 103
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. UAM systems operate by installing a software agent on each employee's computer. This agent gathers data about the user's actions, such as keystrokes, mouse clicks, application usage, and internet activity.

article thumbnail

Resolve to Automate Your Certificate Management in 2024

GlobalSign

Let’s look at how to improve SSL/TLS certificate management through automation and how Atlas Discovery solution can help.

122
122
article thumbnail

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

The Hacker News

Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices. The three harmful packages, named modularseven, driftme, and catme, attracted a total of 431 downloads over the past month before they were taken down.

article thumbnail

The Race to CMMC Compliance: Understanding the DoD’s New Implementation Plan

Approachable Cyber Threats

Category Compliance, News Risk Level Everything you need to know about the DoD’s new CMMC implementation plan, and how to prepare. The DoD just released a proposed rule for implementation of all CMMC requirements by October 1, 2026. The plan will be implemented in four phases: Upon revision to DFARS 252.204-7021, CMMC Model Certification Requirements, DoD will include CMMC Level 1 and 2 self-assessments in all applicable DoD contracts as a condition of award.

Risk 97
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Lost and found: How to locate your missing devices and more

We Live Security

Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy

95
article thumbnail

Zeppelin ransomware source code sold for $500 on hacking forum

Bleeping Computer

A threat actor announced on a cybercrime forum that they sold the source code and a cracked version of the Zeppelin ransomware builder for just $500. [.

article thumbnail

Cybersecurity firm Mandiant has its Twitter account hacked to promote cryptocurrency scam

Graham Cluley

Google-owned cybersecurity company Mandiant has found itself in the awkward position of having to wrestle back control of its Twitter account, after it was hijacked by scammers yesterday.

article thumbnail

Beware of LinkedIn: Ducktail Malware’s Sneaky ZIP Attack Revealed

Penetration Testing

In December 2023, the cybersecurity community was alerted to a new form of cyber threat – the Ducktail malware. This incident, detected by the eSentire Threat Response Unit (TRU), targeted a digital marketing professional,... The post Beware of LinkedIn: Ducktail Malware’s Sneaky ZIP Attack Revealed appeared first on Penetration Testing.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Automating Managed Identity Token Extraction in Azure Container Registries

NetSpi Technical

In the ever-evolving landscape of containerized applications, Azure Container Registry (ACR) is one of the more commonly used services in Azure for the management and deployment of container images. ACR not only serves as a secure and scalable repository for Docker images, but also offers a suite of powerful features to streamline management of the container lifecycle.

article thumbnail

New Bandook RAT Variant Resurfaces, Targeting Windows Machines

The Hacker News

A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an aim to infiltrate Windows machines, underscoring the continuous evolution of the malware. Fortinet FortiGuard Labs, which identified the activity in October 2023, said the malware is distributed via a PDF file that embeds a link to a password-protected.7z archive.

Phishing 100
article thumbnail

To Beat Russia, Ukraine Needs a Major Tech Breakthrough

WIRED Threat Level

Ukraine’s top general says his country must innovate on the level of inventing gunpowder to “break military parity” with Russia. If it’s successful, it could change the future of war.

92
article thumbnail

FTC offers $25,000 prize for detecting AI-enabled voice cloning

Bleeping Computer

The U.S. Federal Trade Commission (FTC) has started accepting submissions for its Voice Cloning Challenge, a public competition with a $25,000 top prize for ideas that protect consumers from the danger of AI-enabled voice cloning for fraudulent activity. [.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.