Thu.Feb 29, 2024

article thumbnail

Fulton County, Security Experts Call LockBit’s Bluff

Krebs on Security

The ransomware group LockBit told officials with Fulton County, Ga. they could expect to see their internal documents published online this morning unless the county paid a ransom demand. LockBit removed Fulton County’s listing from its victim shaming website this morning, claiming the county had paid. But county officials said they did not pay, nor did anyone make payment on their behalf.

article thumbnail

Dashlane Free vs. Premium: Which Plan Is Best For You?

Tech Republic Security

Compare the features and benefits of Dashlane's free and premium versions to determine which option is best for your password management needs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers found a zero-click Facebook account takeover

Security Affairs

A critical vulnerability in Facebook could have allowed threat actors to hijack any Facebook account, researcher warns. Meta addressed a critical Facebook vulnerability that could have allowed attackers to take control of any account. The Nepalese researcher Samip Aryal described the flaw as a rate-limiting issue in a specific endpoint of Facebook’s password reset flow.

article thumbnail

Free VPN vs Paid VPN: Which One Is Right for You?

Tech Republic Security

Discover the key differences between a free VPN and a paid VPN and determine which one is right for your online privacy and security needs.

VPN 160
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks

The Hacker News

Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX) The malware is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications.

Malware 145
article thumbnail

NordPass Free vs. Premium: Is It Worth the Upgrade?

Tech Republic Security

NordPass offers both Free and Premium versions. Learn about the differences and features of each version to determine which one is right for you.

More Trending

article thumbnail

Proton VPN Free vs. Premium: Which Plan Is Best For You?

Tech Republic Security

Compare the features, benefits and limitations of Proton VPN's free and paid versions to determine which option is best for your privacy and security needs.

VPN 148
article thumbnail

Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks

The Hacker News

The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the Windows Kernel as a zero-day to obtain kernel-level access and disable security software on compromised hosts. The vulnerability in question is CVE-2024-21338 (CVSS score: 7.8), which can permit an attacker to gain SYSTEM privileges.

Software 144
article thumbnail

Airbnb scam sends you to a fake Tripadvisor site, takes your money

Malwarebytes

One of my co-workers who works on Malwarebytes’ web research team just witnessed a real life example of how useful his work is in protecting people against scammers. Stefan decided to visit Amsterdam with his girlfriend, and found a very nice and luxurious apartment in Amsterdam on Airbnb. In the description the owner asked interested parties to contact them by email.

Scams 144
article thumbnail

GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories

The Hacker News

GitHub on Thursday announced that it’s enabling secret scanning push protection by default for all pushes to public repositories. “This means that when a supported secret is detected in any push to a public repository, you will have the option to remove the secret from your commits or, if you deem the secret safe, bypass the block,” Eric Tooley and Courtney Claessens said.

144
144
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The White House Warns Cars Made in China Could Unleash Chaos on US Highways

WIRED Threat Level

As Chinese automakers prepare to launch in the US, the White House is investigating whether cars made in China could pose a national security threat.

144
144
article thumbnail

New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems

The Hacker News

Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even in cases where mitigations have been applied against Golden SAML attacks.

article thumbnail

Lazarus APT exploited zero-day in Windows driver to gain kernel privileges

Security Affairs

North Korea-linked Lazarus APT exploited a zero-day flaw in the Windows AppLocker driver (appid.sys) to gain kernel-level access to target systems. Avast researchers observed North Korea-linked Lazarus APT group using an admin-to-kernel exploit for a zero-day vulnerability in the appid.sys AppLocker driver. The zero-day, tracked as CVE-2024-21338 has been addressed by Microsoft in the February Patch Tuesday update.

article thumbnail

A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

WIRED Threat Level

Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared and told them how to get help.

141
141
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Is the LockBit gang resuming its operation?

Security Affairs

Experts warn that the LockBit ransomware group has started using updated encryptors in new attacks, after the recent law enforcement operation. The LockBit ransomware group appears to have fully recovered its operations following the recent law enforcement initiative, code-named Operation Cronos , which aimed to disrupt its activities. Researchers from Zscaler first observed the ransomware group using new ransom notes referencing the new Tor infrastructure.

article thumbnail

Facebook bug could have allowed attacker to take over accounts

Malwarebytes

A vulnerability in Facebook could have allowed an attacker to take over a Facebook account without the victim needing to click on anything at all. The bug was found by a bounty hunter from Nepal called Samip Aryal and has now been fixed by Facebook. In his search for an account takeover vulnerability, the four times Meta Whitehat award receiver started by looking at the uninstall and reinstall process on Android.

article thumbnail

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

The Hacker News

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways, noting that the Integrity Checker Tool (ICT) can be deceived to provide a false sense of security.

article thumbnail

6 Best CRM Software for Small Business for 2024

Tech Republic Security

Check out our guide to the best CRM software and their top features and pricing for small to mid-sized businesses to consider in 2024.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

New SPIKEDWINE APT group is targeting officials in Europe

Security Affairs

A new threat actor, tracked as dubbed SPIKEDWINE, has been observed targeting officials in Europe with a previously undetected backdoor WINELOADER. Zscaler researchers warn that a previously unknown threat actor dubbed SPIKEDWINE has been observed targeting European officials. The cyberspies used a bait PDF document masqueraded as an invitation letter from the Ambassador of India, inviting diplomats to a wine-tasting event in February 2024.

Malware 138
article thumbnail

GitHub Fights Forks — Millions of Them — Huge Software Supply Chain Security FAIL

Security Boulevard

Forking hell: Scrotebots clone thousands of projects, injecting malware millions of times. The post GitHub Fights Forks — Millions of Them — Huge Software Supply Chain Security FAIL appeared first on Security Boulevard.

Software 137
article thumbnail

New Backdoor Targeting European Officials Linked to Indian Diplomatic Events

The Hacker News

A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European countries with Indian diplomatic missions using a new backdoor called WINELOADER.

135
135
article thumbnail

Pentest Muse: Revolutionizing Penetration Testing with AI Automation

Penetration Testing

Pentest Muse Building an AI agent that can automate parts of pentesting jobs and provide live suggestions to pentesters. Requirements Python 3.12 or later Necessary Python packages as listed in requirements.txt OpenAI API key Modes... The post Pentest Muse: Revolutionizing Penetration Testing with AI Automation appeared first on Penetration Testing.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Citrix, Sophos software impacted by 2024 leap year bugs

Bleeping Computer

Citrix and Sophos products have been impacted by leap year flaws, leading to unexpected problems in their products. [.

Software 132
article thumbnail

The Strengths and Weaknesses of MFA Methods Against Cyberattacks: Part 3

Duo's Security Blog

The choice of authentication methods plays a key role in defending against identity threats. In the first two blogs of this three-part series, we discussed the MFA methods available to users and their strengths and weaknesses in defending against five types of cyberattack. In this blog, we’ll discuss how end-users and administrators can select the best methods to keep themselves and their organizations secure.

article thumbnail

How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI

The Hacker News

As an IT leader, staying on top of the latest cybersecurity developments is essential to keeping your organization safe. But with threats coming from all around — and hackers dreaming up new exploits every day — how do you create proactive, agile cybersecurity strategies?

Risk 130
article thumbnail

The UK’s GPS Tagging of Migrants Has Been Ruled Illegal

WIRED Threat Level

The UK’s privacy regulator says the government did not take into account the intrusiveness of ankle tags that continuously monitor a person’s location.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

New Bifrost malware for Linux mimics VMware domain for evasion

Bleeping Computer

A new Linux variant of the Bifrost remote access trojan (RAT) employs several novel evasion techniques, including the use of a deceptive domain that was made to appear as part of VMware. [.

Malware 127
article thumbnail

RoboForm Free vs. Paid: Which Plan Is Best For You?

Tech Republic Security

Explore the differences between RoboForm's free and paid versions, and decide which one is the right fit for your organization.

article thumbnail

Lazarus Group Suspected in Telegram Phishing Attacks on Investors

Penetration Testing

The world of blockchain and angel investing can be thrilling but also fraught with risks. Security experts from Hunt are currently tracking a sophisticated phishing scheme aimed squarely at entrepreneurs operating within Telegram communities... The post Lazarus Group Suspected in Telegram Phishing Attacks on Investors appeared first on Penetration Testing.

Phishing 124
article thumbnail

Here Are the Google and Microsoft Security Updates You Need Right Now

WIRED Threat Level

Plus: Mozilla patches 12 flaws in Firefox, Zoom fixes seven vulnerabilities, and more critical updates from February.

Hacking 123
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.