Wed.Dec 27, 2023

article thumbnail

New iPhone Security Features to Protect Stolen Devices

Schneier on Security

Apple is rolling out a new “Stolen Device Protection” feature that seems well thought out: When Stolen Device Protection is turned on, Face ID or Touch ID authentication is required for additional actions, including viewing passwords or passkeys stored in iCloud Keychain, applying for a new Apple Card, turning off Lost Mode, erasing all content and settings, using payment methods saved in Safari, and more.

article thumbnail

Operation Triangulation: The last (hardware) mystery

SecureList

Today, on December 27, 2023, we ( Boris Larin , Leonid Bezvershenko , and Georgy Kucherin ) delivered a presentation, titled, “Operation Triangulation: What You Get When Attack iPhones of Researchers”, at the 37th Chaos Communication Congress (37C3), held at Congress Center Hamburg. The presentation summarized the results of our long-term research into Operation Triangulation, conducted with our colleagues, Igor Kuznetsov , Valentin Pashkov , and Mikhail Vinogradov.

Firmware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elections 2024, artificial intelligence could upset world balances

Security Affairs

Governments should recognize electoral processes as critical infrastructure and enact laws to regulate the use of generative Artificial Intelligence. Elections are scheduled in several countries worldwide in 2024, with potential geopolitical implications. Key events include the European Parliament elections in June, the U.S. presidential elections in November, and the French and German presidential elections in April and September, respectively.

article thumbnail

iPhone Triangulation attack abused undocumented hardware feature

Bleeping Computer

The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections. [.

Spyware 130
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Experts analyzed attacks against poorly managed Linux SSH servers

Security Affairs

Researchers warn of attacks against poorly managed Linux SSH servers that mainly aim at installing DDoS bot and CoinMiner. Researchers at AhnLab Security Emergency Response Center (ASEC) are warning about attacks targeting poorly managed Linux SSH servers, primarily focused on installing DDoS bots and CoinMiners. In the reconnaissance phase, the threat actors perform IP scanning to look for servers with the SSH service, or port 22 activated, then launch a brute force or dictionary attack to obta

DDOS 139
article thumbnail

Barracuda fixes new ESG zero-day exploited by Chinese hackers

Bleeping Computer

Network and email security firm Barracuda says it remotely patched all active Email Security Gateway (ESG) appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers. [.

123
123

More Trending

article thumbnail

Yakult Australia confirms 'cyber incident' after 95 GB data leak

Bleeping Computer

Yakult Australia, manufacturer of a probiotic milk drink, has confirmed experiencing a "cyber incident" in a statement to BleepingComputer. Both the company's Australian and New Zealand IT systems have been affected. Cybercrime actor DragonForce which claimed responsibility for the attack has also leaked 95 GB of data. [.

article thumbnail

Xamalicious Android malware distributed through the Play Store

Security Affairs

Researchers discovered a new Android malware dubbed Xamalicious that can take full control of the device and perform fraudulent actions. McAfee Mobile Research Team discovered a new Android backdoor dubbed Xamalicious that can take full control of the device and perform fraudulent actions. The malware has been implemented with Xamarin, an open-source framework that allows building Android and iOS apps with.NET and C#.

Malware 130
article thumbnail

Lockbit ransomware disrupts emergency care at German hospitals

Bleeping Computer

German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) has confirmed that recent service disruptions were caused by a Lockbit ransomware attack where the threat actors gained access to IT systems and encrypted devices on the network. [.

article thumbnail

This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy

WIRED Threat Level

Apple updated its location-tracking system in an attempt to cut down on AirTag abuse while still preserving privacy. Researchers think they’ve found a better balance.

117
117
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Panasonic discloses data breach after December 2022 cyberattack

Bleeping Computer

Panasonic Avionics Corporation, a leading supplier of in-flight communications and entertainment systems, disclosed a data breach affecting an undisclosed number of individuals after its corporate network was breached more than one year ago, in December 2022. [.

article thumbnail

Data Scanning: How to Protect Sensitive & Confidential Data

Digital Guardian

Being able to scan your data can give you the full scope of where files exist and what needs to be properly secured. In this blog, we break down why it's a key part of data loss prevention, who uses data scanning, and why it's important.

102
102
article thumbnail

New Xamalicious Android malware installed 330k times on Google Play

Bleeping Computer

A previously unknown Android backdoor named 'Xamalicious' has infected approximately 338,300 devices via malicious apps on Google Play, Android's official app store. [.

Malware 111
article thumbnail

How ransomware operators try to stay under the radar

Malwarebytes

An often heard remark is that when your security solution notices a ransomware attack, it’s already too late. There’s a lot of truth in that, if you consider the encryption process to be the ransomware attack. However, these days encryption is just a part of many ransomware attacks. Some of the cybercriminals we conveniently call ransomware groups have even completely stopped using the encryption process because it’s too “noisy.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ohio Lottery hit by cyberattack claimed by DragonForce ransomware

Bleeping Computer

The Ohio Lottery was forced to shut down some key systems after a cyberattack affected an undisclosed number of internal applications on Christmas Eve. [.

article thumbnail

Above: Invisible protocol sniffer for finding vulnerabilities in the network

Penetration Testing

Above Invisible protocol sniffer for finding vulnerabilities in the network. Designed for pentesters and security professionals. Mechanics Above is an invisible network sniffer for finding vulnerabilities in network equipment. It is based entirely on... The post Above: Invisible protocol sniffer for finding vulnerabilities in the network appeared first on Penetration Testing.

article thumbnail

Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances

The Hacker News

Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoor on a "limited number" of devices.

102
102
article thumbnail

The Urgent Need to Patch Buffalo’s VR-S1000 VPN Router

Penetration Testing

In the digital era, small and medium-sized businesses have become increasingly reliant on the Internet for their daily operations. However, with this reliance comes a heightened vulnerability to cyber threats. The recent discovery of... The post The Urgent Need to Patch Buffalo’s VR-S1000 VPN Router appeared first on Penetration Testing.

VPN 103
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices

The Hacker News

A new Android backdoor has been discovered with potent capabilities to carry out a range of malicious actions on infected devices. Dubbed Xamalicious by the McAfee Mobile Research Team, the malware is so named for the fact that it's developed using an open-source mobile app framework called Xamarin and abuses the operating system's accessibility permissions to fulfill its objectives.

Malware 100
article thumbnail

Got a new device? 7 things to do before disposing of your old tech

We Live Security

Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information

109
109
article thumbnail

New Rugmi Malware Loader Surges with Hundreds of Daily Detections

The Hacker News

A new malware loader is being used by threat actors to deliver a wide range of information stealers such as Lumma Stealer (aka LummaC2), Vidar, RecordBreaker (aka Raccoon Stealer V2), and Rescoms. Cybersecurity firm ESET is tracking the trojan under the name Win/TrojanDownloader.Rugmi.

Malware 99
article thumbnail

Mortgage firm LoanCare warns 1.3 million people of data breach

Bleeping Computer

Mortgage servicing company LoanCare is warning 1,316,938 borrowers across the U.S. that their sensitive information was exposed in a data breach at its parent company, Fidelity National Financial. [.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack

The Hacker News

A new zero-day security flaw has been discovered in the Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system that could be exploited to bypass authentication protections. The vulnerability, tracked as CVE-2023-51467, resides in the login functionality and is the result of an incomplete patch for another critical vulnerability (CVE-2023-49070, CVSS score: 9.

article thumbnail

CVE-2023-47565 Flaw in QNAP NVR Devices Exploited in the Wild

Penetration Testing

In a digital landscape increasingly dotted with sophisticated surveillance solutions, the discovery of a critical vulnerability in QNAP’s VioStor Network Video Recorder (NVR) devices serves as a stark reminder of the ever-present cybersecurity risks.... The post CVE-2023-47565 Flaw in QNAP NVR Devices Exploited in the Wild appeared first on Penetration Testing.

article thumbnail

A cyberattack hit Australian healthcare provider St Vincent’s Health Australia

Security Affairs

St Vincent’s Health Australia, the largest Australian healthcare provider, suffered a data breach after a cyber attack. St Vincent’s Health Australia is the largest non-profit healthcare provider in the country, The healthcare system was hit by a cyberattack that resulted in a data breach. St Vincent’s Health Australia reported the incident to local authorities and is working with the Australian government to mitigate the security incident.

article thumbnail

Beyond Zero-Day: Operation Triangulation Redefines iPhone Hacking

Penetration Testing

Experts Boris Larin, Leonid Bezvershenko, and Georgy Kucherin from Kaspersky Lab presented a report titled “Operation Triangulation: What You Get When Attack iPhones of Researchers” at the 37th Chaos Communication Congress (37C3 hacker conference. They summarized... The post Beyond Zero-Day: Operation Triangulation Redefines iPhone Hacking appeared first on Penetration Testing.

Hacking 95
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

What Is Endpoint Security Management and Why Is It Important?

Security Boulevard

Among all IT components, endpoints are the easiest to exploit, making them the most vulnerable to cyberattacks. This makes endpoint Read More The post What Is Endpoint Security Management and Why Is It Important? appeared first on Kaseya. The post What Is Endpoint Security Management and Why Is It Important? appeared first on Security Boulevard.

article thumbnail

Google Kubernetes Engine Double Flaws: Exploiting FluentBit & ASM for Cluster Takeover

Penetration Testing

In the ever-evolving landscape of container orchestration, Google Kubernetes Engine (GKE) stands as a colossus, offering scalable and efficient solutions. However, recent revelations from Palo Alto Networks have cast a spotlight on two specific... The post Google Kubernetes Engine Double Flaws: Exploiting FluentBit & ASM for Cluster Takeover appeared first on Penetration Testing.

article thumbnail

CMMC v2.0 vs NIST 800-171: Understanding the Differences

Security Boulevard

The U.S. Defense Industrial Base (DIB) Sector is the worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements. With over 250,000+ DIB companies and their subcontractors involved in the sector, including domestic and foreign […] The post CMMC v2.0 vs NIST 800-171: Understanding the Differences appeared first on Centraleyes.

69
article thumbnail

ioLogik E1200: CVE-2023-5961 & CVE-2023-5962 – Vulnerabilities Open Doors to Hackers

Penetration Testing

In the realm of industrial automation, the ioLogik E1200 Series has emerged as a beacon of versatility and convenience, bridging the communication gap between Information Technology (IT) and Operational Technology (OT) engineers. This ingenious... The post ioLogik E1200: CVE-2023-5961 & CVE-2023-5962 – Vulnerabilities Open Doors to Hackers appeared first on Penetration Testing.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.