Tue.Jan 23, 2024

article thumbnail

Side Channels Are Common

Schneier on Security

Really interesting research: “ Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression.

300
300
article thumbnail

Microsoft Says State-Sponsored Attackers Accessed Senior Leaders’ Emails

Tech Republic Security

The Midnight Blizzard gang appears to have been looking for information about itself. See how organizations can protect their accounts from password spray attacks.

Passwords 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“The mother of all breaches”: 26 billion records found online

Malwarebytes

Security researchers have discovered billions of exposed records online, calling it the “mother of all breaches” However, the dataset doesn’t seem to be from one single data breach, but more a compilation of multiple breaches. These sets are often created by data enrichment companies. Data enrichment is the process of combining first party data from internal sources with disparate data from other internal systems or third party data from external sources.

article thumbnail

Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Tech Republic Security

Australian organisations are so focused on preventing data breaches that they’re unaware that the concern of most of their customers has more to do with privacy.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

HP CEO Says They Brick Printers That Use Third-Party Ink Because of … Hackers

WIRED Threat Level

The company says it wants to protect you from “viruses.” Experts are skeptical.

145
145
article thumbnail

Black Basta gang claims the hack of the UK water utility Southern Water

Security Affairs

The Black Basta ransomware gang claimed to have hacked the UK water utility Southern Water, a major player in the UK water industry. Southern Water is a private utility company responsible for collecting and treating wastewater in Hampshire, the Isle of Wight, West Sussex, East Sussex and Kent, and for providing public water supply to approximately half of this area.

Hacking 144

More Trending

article thumbnail

CISA adds VMware vCenter Server bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds VMware vCenter Server Out-of-Bounds Write bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a VMware vCenter Server Out-of-Bounds Write bug, tracked as CVE-2023-34048 , to its Known Exploited Vulnerabilities (KEV) catalog. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Firewall 141
article thumbnail

Information Security Incident Reporting Policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation. From the policy: STEPS TO TAKE IF YOU SUSPECT AN INFORMATION SECURITY.

article thumbnail

Australian government announced sanctions for Medibank hacker

Security Affairs

The Australian government announced sanctions for a member of the REvil ransomware group for the Medibank hack that occurred in 2022. The Australian government announced sanctions for Aleksandr Gennadievich Ermakov (aka GustaveDore, aiiis_ermak, blade_runner, JimJones), a Russian national who is a member of the REvil ransomware group. The man is responsible for the cyber attacks that in 2022 hit the Australian insurance provider Medibank. “This morning I can announce that Australia has use

article thumbnail

FBI and CISA Warn of Androxgh0st Malware Attacks

Security Boulevard

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint Cybersecurity Advisory warning of the escalating threat posed by Androxgh0st malware. Threat actors are using this Python-scripted malware to build a botnet focused on cloud credential theft, with the stolen information being leveraged to deliver additional malicious payloads.

Malware 131
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

LoanDepot data breach impacted roughly 16.6 individuals

Security Affairs

Financial services company LoanDepot disclosed a data breach that impacted roughly 16.6 million individuals. LoanDepot is a financial services company that primarily operates as a mortgage lender. It is one of the largest nonbank lenders in the United States. The company provides a range of mortgage and non-mortgage loan products and services. LoanDepot disclosed this week a data breach that impacted roughly 16.6 million individuals.

article thumbnail

Kasseika ransomware uses antivirus driver to kill other antiviruses

Bleeping Computer

A recently uncovered ransomware operation named 'Kasseika' has joined the club of threat actors that employs Bring Your Own Vulnerable Driver (BYOVD) tactics to disable antivirus software before encrypting files. [.

Antivirus 123
article thumbnail

Watch out, a new critical flaw affects Fortra GoAnywhere MFT

Security Affairs

Fortra addressed a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) product. Fortra warns customers of a new authentication bypass vulnerability tracked as CVE-2024-0204 (CVSS score 9.8), impacting the GoAnywhere MFT (Managed File Transfer) product. Fortra GoAnywhere Managed File Transfer is a comprehensive solution for secure file transfer, data encryption, and compliance management.

article thumbnail

Lacework and Securiti Ally to Better Secure Data

Security Boulevard

Lacework and Securiti are partnering to integrate their respective DSPM and CNAPP platforms. The post Lacework and Securiti Ally to Better Secure Data appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Trello API abused to link email addresses to 15 million accounts

Bleeping Computer

An exposed Trello API allows linking private email addresses with Trello accounts, enabling the creation of millions of data profiles containing both public and private information. [.

article thumbnail

CISA, FBI, EPA Offer Cybersecurity Guide for Water System Operators

Security Boulevard

After some stops and starts, U.S. federal agencies have issued guidance to help water and wastewater system operators better respond to cyberattacks, an important step as threat actors are increasingly targeting the sector. The document was put together by the Environmental Protection Agency (EPA), FBI, and Cybersecurity and Infrastructure Security Agency (CISA) and touches on.

article thumbnail

Top Cybersecurity Predictions for 2024 (Free Download)

Tech Republic Security

While artificial intelligence discourse and chatbots dominated 2023, the cybersecurity space still pulled our attention now and then with cyberattacks, reminding us that technology advancements without cybersecurity can be counterintuitive, an approach akin to setting the cart before the horse. With this in mind, TechRepublic Premium spoke with a wide range of experts to find.

article thumbnail

Patch Your GoAnywhere MFT Immediately - Critical Flaw Lets Anyone Be Admin

The Hacker News

A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer (MFT) software that could be abused to create a new administrator user. Tracked as CVE-2024-0204, the issue carries a CVSS score of 9.8 out of 10. "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Windows 10 KB5034203 preview update adds EU DMA compliance

Bleeping Computer

Microsoft has released the January 2024 preview update for Windows 10, version 22H2, which adds Digital Markets Act (DMA) compliance in the European Economic Area (EEA) to allow European users to uninstall all apps in Windows by March 6. [.

Marketing 108
article thumbnail

BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time

The Hacker News

Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his role as the creator and administrator of BreachForums. Fitzpatrick, who went by the online alias "pompompurin," was arrested in March 2023 in New York and was subsequently charged with conspiracy to commit access device fraud and possession of child pornography.

108
108
article thumbnail

Break the fake: The race is on to stop AI voice cloning scams

We Live Security

As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection

Scams 108
article thumbnail

From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks

The Hacker News

As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication in which the company releases internal analytics to track DDoS attacks. Gcore’s broad, internationally distributed network of scrubbing centers allows them to follow attack trends over time.

DDOS 108
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Favorite SOC Analyst Interview Questions

Digital Guardian

Hiring a SOC analyst? Asking the right questions is key to identifying the best employee as well as helping determine what skills can best complement your organization.

106
106
article thumbnail

VexTrio: The Uber of Cybercrime - Brokering Malware for 60+ Affiliates

The Hacker News

The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive "criminal affiliate program," new findings from Infoblox reveal.

article thumbnail

Unpacking Kasseika: The Latest Ransomware to Exploit BYOVD Tactics

Penetration Testing

As the digital landscape evolves, so too does the sophistication of threats that lurk within it. The Kasseika ransomware, identified amidst a surge in bring-your-own-vulnerable-driver (BYOVD) attacks in 2023, emerges as a formidable adversary.... The post Unpacking Kasseika: The Latest Ransomware to Exploit BYOVD Tactics appeared first on Penetration Testing.

article thumbnail

~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation

The Hacker News

Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian Confluence Data Center and Confluence Server, within three days of public disclosure. Tracked as CVE-2023-22527 (CVSS score: 10.

Software 105
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Water services giant Veolia North America hit by ransomware attack

Bleeping Computer

Veolia North America, a subsidiary of transnational conglomerate Veolia, disclosed a ransomware attack that impacted systems part of its Municipal Water division and disrupted its bill payment systems. [.

article thumbnail

"Activator" Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

The Hacker News

Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information and cryptocurrency wallet data. Kaspersky, which identified the artifacts in the wild, said they are designed to target machines running macOS Ventura 13.

Malware 105
article thumbnail

Exploit released for Fortra GoAnywhere MFT auth bypass bug

Bleeping Computer

Exploit code is now available for a critical authentication bypass vulnerability in Fortra's GoAnywhere MFT (Managed File Transfer) software that allows attackers to create new admin users on unpatched instances via the administration portal. [.

article thumbnail

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

The Hacker News

Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were installed.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.