Wed.May 29, 2024

article thumbnail

Operation Endgame

Troy Hunt

Today we loaded 16.5M email addresses and 13.5M unique passwords provided by law enforcement agencies into Have I Been Pwned (HIBP) following botnet takedowns in a campaign they've coined Operation Endgame. That link provides an excellent over so start there then come back to this blog post which adds some insight into the data and explains how HIBP fits into the picture.

Passwords 324
article thumbnail

Is Your Computer Part of ‘The Largest Botnet Ever?’

Krebs on Security

The U.S. Department of Justice (DOJ) today said they arrested the alleged operator of 911 S5 , a ten-year-old online anonymity service that was powered by what the director of the FBI called “likely the world’s largest botnet ever.” The arrest coincided with the seizure of the 911 S5 website and supporting infrastructure, which the government says turned computers running various “free VPN” products into Internet traffic relays that facilitated billions of dollars i

VPN 312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Rich threat intel, specialized graph database fuel HYAS’ Protective DNS

The Last Watchdog

The capacity to withstand network breaches, and minimize damage, is a key characteristic of digital resiliency. Related: Selecting a Protective DNS One smart way to do this is by keeping an eagle eye out for rogue command and control (C2) server communications. Inevitably, compromised devices will try to connect with a C2 server for instructions. And this beaconing must intersect with the Domain Name System (DNS.

DNS 147
article thumbnail

Scammers Build Fraud Campaigns Around Free Piano Offers

Security Boulevard

Scammers are betting that if people are offered a free – yet unsolicited – piano, some will jump at the deal. That appears to be happening. According to threat researchers at cybersecurity firm Proofpoint, bad actors running multiple ongoing campaigns since January have been using such piano-themed emails to entice targets into advanced fee fraud. The post Scammers Build Fraud Campaigns Around Free Piano Offers appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Decoding Water Sigbin's Latest Obfuscation Tricks

Trend Micro

Water Sigbin (aka the 8220 Gang) exploited Oracle WebLogic vulnerabilities to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.

article thumbnail

Malicious PyPI Package ‘Pytoileur’ Targets Windows and Leverages Stack Overflow for Distribution

Security Boulevard

Another day, another PyPI malware package. But this one has a new way to (try to) sneak into your computer. The post Malicious PyPI Package ‘Pytoileur’ Targets Windows and Leverages Stack Overflow for Distribution appeared first on Security Boulevard.

Malware 124

More Trending

article thumbnail

NIST Struggles with NVD Backlog as 93% of Flaws Remain Unanalyzed

Security Boulevard

The funding cutbacks announced in February have continued to hobble NIST’s ability to keep the government’s National Vulnerabilities Database (NVD) up to date, with one cybersecurity company finding that more than 93% of the flaws added have not been analyzed or enhanced, a problem that will make organizations less safe. “With the recent slowdown of.

article thumbnail

Okta Warns of Credential Stuffing Attacks Targeting Customer Identity Cloud

The Hacker News

Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC) is susceptible to credential stuffing attacks orchestrated by threat actors. "We observed that the endpoints used to support the cross-origin authentication feature being attacked via credential stuffing for a number of our customers," the Identity and access management (IAM) services provider said.

article thumbnail

Ticketmaster Hacked, Personal Data of 560 Million Customers Leaked, ShinyHunters Claim

Security Boulevard

Ticket to Hide: A threat group hacked 1.3 terabytes of Ticketmaster customer data, including payment information. It’s threatening to release the personal data unless a ransom is paid. The post Ticketmaster Hacked, Personal Data of 560 Million Customers Leaked, ShinyHunters Claim appeared first on Security Boulevard.

Hacking 119
article thumbnail

Cybercriminals Abuse StackOverflow to Promote Malicious Python Package

The Hacker News

Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 times as of writing.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cybercriminals pose as "helpful" Stack Overflow users to push malware

Bleeping Computer

Cybercriminals are abusing Stack Overflow in an interesting approach to spreading malware—answering users' questions by promoting a malicious PyPi package that installs Windows information-stealing malware. [.

Malware 116
article thumbnail

Check Point released hotfix for actively exploited VPN zero-day

Security Affairs

Check Point released hotfixes for a VPN zero-day vulnerability, tracked as CVE-2024-24919, which is actively exploited in attacks in the wild. Check Point released hotfixes to address a VPN zero-day vulnerability, tracked as CVE-2024-24919 , which is actively being exploited in attacks in the wild. The vulnerability CVE-2024-24919 is a Quantum Gateway information disclosure issue.

VPN 125
article thumbnail

Microsoft Uncovers 'Moonstone Sleet' — New North Korean Hacker Group

The Hacker News

A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software and information technology, education, and defense industrial base sectors with ransomware and bespoke malware previously associated with the infamous Lazarus Group.

Education 114
article thumbnail

Okta warns of credential stuffing attacks targeting its Cross-Origin Authentication feature

Security Affairs

Identity and access management firm Okta warns of credential stuffing attacks targeting the Customer Identity Cloud (CIC) feature. Okta warns of credential stuffing attacks targeting its Customer Identity Cloud (CIC) feature since April. A credential stuffing attack is a type of cyber attack where hackers use large sets of username and password combinations, typically obtained from previous data breaches, phishing campaigns, or info-stealer infections, to gain unauthorized access to user account

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams

The Hacker News

The U.S. Department of Justice (DoJ) has sentenced a 31-year-old to 10 years in prison for laundering more than $4.5 million through business email compromise (BEC) schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023.

Scams 114
article thumbnail

Check Point releases emergency fix for VPN zero-day exploited in attacks

Bleeping Computer

Check Point has released hotfixes for a VPN zero-day vulnerability exploited in attacks to gain remote access to firewalls and attempt to breach corporate networks. [.

VPN 105
article thumbnail

Check Point Warns of Zero-Day Attacks on its VPN Gateway Products

The Hacker News

Check Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild. Tracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances.

VPN 113
article thumbnail

Employee Termination Policy

Tech Republic Security

Whether due to resignation, layoff or firing, separating employees from the business is never a pleasant process nor is it always easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee terminations and streamline the experience as.

88
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

New Research Warns About Weak Offboarding Management and Insider Risks

The Hacker News

A recent study by Wing Security found that 63% of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks. Employee offboarding is typically seen as a routine administrative task, but it can pose substantial security risks, if not handled correctly.

Risk 109
article thumbnail

Cooler Master hit by data breach exposing customer information

Bleeping Computer

Computer hardware manufacturer Cooler Master has suffered a data breach after a threat actor breached the company's website and claimed to steal the Fanzone member information of 500,000 customers. [.

article thumbnail

Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha

The Hacker News

Brazilian banking institutions are the target of a new campaign that distributes a custom variant of the Windows-based AllaKore remote access trojan (RAT) called AllaSenha.

Banking 103
article thumbnail

‘Largest Botnet Ever’ Tied to Billions in Stolen Covid-19 Relief Funds

WIRED Threat Level

The US says a Chinese national operated the “911 S5” botnet, which included computers worldwide and was used to file hundreds of thousands of fraudulent Covid claims and distribute CSAM, among other crimes.

Hacking 99
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

US dismantles 911 S5 botnet used for cyberattacks, arrests admin

Bleeping Computer

The U.S. Justice Department and international partners dismantled the 911 S5 proxy botnet and arrested 35-year-old Chinese national YunHe Wang, its administrator. [.

100
100
article thumbnail

How to turn off location tracking on iOS and iPadOS

Malwarebytes

On iOS and iPadOS, location services are typically turned on when you first set up your device. However, there may be reasons why you don’t want your device to be located, perhaps because you don’t want to be found but need to keep the device with you. There are a few options to hide your location from prying eyes. Please note: I will only mention iOS from here on, but the instructions are almost the same for iPadOS.

article thumbnail

Okta warns of credential stuffing attacks targeting its CORS feature

Bleeping Computer

Okta warns that a Customer Identity Cloud (CIC) feature is being targeted in credential stuffing attacks, stating that numerous customers have been targeted since April. [.

98
article thumbnail

CVE-2024-24919: Active Exploitation of Check Point Remote Access VPN Vulnerability

Penetration Testing

In a recent advisory, Check Point has alerted its users to an active campaign targeting Remote Access VPN devices. Threat actors are exploiting this vulnerability to breach enterprise networks, prompting an immediate response from... The post CVE-2024-24919: Active Exploitation of Check Point Remote Access VPN Vulnerability appeared first on Penetration Testing.

VPN 96
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Check Point VPN zero-day exploited in attacks since April 30

Bleeping Computer

Threat actors have been exploiting a high-severity Check Point Remote Access VPN zero-day since at least April 30, stealing Active Directory data needed to move laterally through the victims' networks in successful attacks. [.

VPN 94
article thumbnail

ESET World 2024: Big on prevention, even bigger on AI

We Live Security

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

article thumbnail

Going going gone! Ransomware attack grabs Christie’s client data for a steal

Graham Cluley

The world-renowned auction house Christie's has confirmed that it has fallen victim to a ransomware attack, seemingly orchestrated by a Russia-linked cybercriminal gang. Read more in my article on the Hot for Security blog.

article thumbnail

WEF Outlines Path to Cyber Resilience for Manufacturing Sector

SecureWorld News

The manufacturing sector faces an increasingly daunting cyber threat landscape that puts production operations, intellectual property, and entire supply chains at risk. In a white paper released this month, the World Economic Forum (WEF) has issued a call to action for industrial companies to foster a pervasive culture of cyber resilience. Titled " Building a Culture of Cyber Resilience in Manufacturing ," the report provides a comprehensive framework for instilling cybersecurity priorities and

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.