Mon.Jun 03, 2024

article thumbnail

AI Will Increase the Quantity—and Quality—of Phishing Scams

Schneier on Security

A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review : Summary. Gen AI tools are rapidly making these emails more advanced, harder to spot, and significantly more dangerous. Recent research showed that 60% of participants fell victim to artificial intelligence (AI)-automated phishing, which is comparable to the success rates of non-AI-phishing messages created by human experts.

Phishing 304
article thumbnail

RSAC Fireside Chat: NightVision shines a light on software vulnerabilities, speeds up remediation

The Last Watchdog

When Log4J came to light in 2021, Kinnaird McQuade , then a security engineer at Square , drew the assignment of testing endpoints at some 5,000 users of the popular mobile payments service. Related: The big lesson from Log4J “It took us eight hours to run the scan and I was sweating it because these were all small family businesses that depended on Square, and if any of them got popped, it would be real people that were affected,” McQuade told me.

Software 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeing Like a Data Structure

Schneier on Security

Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control nature and build large, complex human societies, and the more we employed and mastered technology, the better things got. We don’t live in that world anymore. Not only has technology become entangled with the structure of society, but we also can no longer see the world around us without it.

article thumbnail

5 Reasons Why You Should Use a Password Manager

Tech Republic Security

Here are 5 reasons why you should consider using a password manager to protect your data and improve password management.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

APT28 targets key networks in Europe with HeadLace malware

Security Affairs

Russia-linked APT28 used the HeadLace malware and credential-harvesting web pages in attacks against networks across Europe. Researchers at Insikt Group observed Russian GRU’s unit APT28 targeting networks across Europe with information-stealer Headlace and credential-harvesting web pages. The experts observed the APT deploying Headlace in three distinct phases from April to December 2023, respectively, using phishing, compromised internet services, and living off the land binaries.

Malware 141
article thumbnail

The NIST Finally Hires a Contractor to Manage CVEs

Security Boulevard

Security experts have been frustrated because no one was managing the Common Vulnerabilities and Exposures security reports. Good news: The NIST has hired a company to manage the backlog. Bad news: The company has no experience with this kind of security work. The post The NIST Finally Hires a Contractor to Manage CVEs appeared first on Security Boulevard.

Software 136

More Trending

article thumbnail

Google Hates Ad Blockers: Manifest V3 Push Starts Today

Security Boulevard

We warned you. As of June 3, Google is following through on its threat to kill ad blockers. Privacy-focused Chrome extensions are living on borrowed time; developers must upgrade to the less capable “Manifest V3” API. The post Google Hates Ad Blockers: Manifest V3 Push Starts Today appeared first on Security Boulevard.

article thumbnail

361 million stolen accounts leaked on Telegram added to HIBP

Bleeping Computer

A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check if their accounts have been compromised. [.

article thumbnail

Cyberattack Risks Keep Small Business Security Teams on Edge

Security Boulevard

Three-quarters of SMBs fear that a cyberattack could put them out of business. For good reason: 96% of them have already been the victims of a cyberattack. The post Cyberattack Risks Keep Small Business Security Teams on Edge appeared first on Security Boulevard.

article thumbnail

CISA adds Oracle WebLogic Server flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds Oracle WebLogic Server OS command injection vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Oracle WebLogic Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The issue, tracked as CVE-2017-3506 (CVSS score 7.4), is an OS command injection.

Hacking 134
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions

The Hacker News

Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain unauthorized access to the devices and run malicious commands.

125
125
article thumbnail

Spanish police shut down illegal TV streaming network

Security Affairs

Spanish police dismantled a pirated TV streaming network that allowed its operators to earn over 5,300,000 euros since 2015. The Spanish National Police dismantled a network that illicitly distributed audiovisual content, earning over 5,300,000 euros since 2015. The police arrested eight individuals in Las Palmas de Gran Canaria, Madrid, Oviedo, and Málaga, and searched two homes.

article thumbnail

DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

The Hacker News

Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey mechanism to deliver the last stages, underscoring continued efforts on the part of the threat actors to continuously stay ahead of the detection curve.

article thumbnail

Multiple flaws in Cox modems could have impacted millions of devices

Security Affairs

Researcher discovered several authorization bypass vulnerabilities in Cox modems that potentially impacted millions of devices. The security researcher Sam Curry discovered multiple issues in Cox modems that could have been exploited to modify the settings of the vulnerable modem and run malicious commands on them. Cox is the largest private broadband provider in the United States, the third-largest cable television provider, and the seventh-largest telephone carrier in the country.

Hacking 126
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Urgent Security Update for Zyxel NAS Devices: Patches Available for Critical Flaws

Penetration Testing

Zyxel has released critical security patches for two of its Network Attached Storage (NAS) devices, NAS326 and NAS542, addressing severe vulnerabilities that could allow attackers to execute code remotely and compromise system security. The... The post Urgent Security Update for Zyxel NAS Devices: Patches Available for Critical Flaws appeared first on Penetration Testing.

article thumbnail

Authorities Ramp Up Efforts to Capture the Mastermind Behind Emotet

The Hacker News

Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the name Odd and is allegedly the mastermind behind the Emotet malware. Odd is also said to go by the nicknames Aron, C700, Cbd748, Ivanov Odd, Mors, Morse, Veron over the past few years, according to a video released by the agencies. "Who is he working with?

Malware 112
article thumbnail

Vulnerability Recap 6/3/24 – Check Point, Okta & Fortinet Issues

eSecurity Planet

Last week, major security vendors Check Point and Okta both notified customers of threats, and an old Fortinet vulnerability reared its head when researchers published a proof of concept for it. Spoofed browser upgrades download malware onto victims’ computers, and threat actors have been actively exploiting a Linux kernel vulnerability. Check your vendors’ security bulletins regularly, and make sure your team is following security news to patch issues as soon as they arise.

VPN 109
article thumbnail

Andariel Hackers Target South Korean Institutes with New Dora RAT Malware

The Hacker News

The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora RAT in its attacks targeting educational institutes, manufacturing firms, and construction businesses in South Korea.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Windows Attack Surface Management: Script-based Malware

Digital Shadows

Secure PowerShell, JScript, and VBScript against cyber threats by configuring tailored controls and using Windows Defender Exploit Guard to protect your endpoints.

article thumbnail

macOS Root Access Exploit: PoC Code for CVE-2024-27822 Released

Penetration Testing

A security researcher has published details and proof-of-concept (PoC) code for a macOS CVE-2024-27822 vulnerability that could be exploited to gain root privileges. The security defect was identified and reported in March, with a... The post macOS Root Access Exploit: PoC Code for CVE-2024-27822 Released appeared first on Penetration Testing.

article thumbnail

How to Start a Career in Cybersecurity

Tech Republic Security

Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline Clarke for TechRepublic Premium, highlights the methods people can take to begin a career in cybersecurity, provides expert insights from industry professionals and discusses the varying factors surrounding this lucrative area.

article thumbnail

Excel File Unleashes Sophisticated Cobalt Strike Cyberattack

Penetration Testing

FortiGuard Labs has recently unveiled a sophisticated cyberattack that leverages an Excel file embedded with a VBA macro to deploy a DLL file. This multi-stage malware strategy ultimately delivers the notorious “Cobalt Strike” payload,... The post Excel File Unleashes Sophisticated Cobalt Strike Cyberattack appeared first on Penetration Testing.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users

The Hacker News

Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to drop a remote access trojan (RAT) on compromised systems. The package in question is glup-debugger-log, which targets users of the gulp toolkit by masquerading as a "logger for gulp and gulp plugins." It has been downloaded 175 times to date.

Software 105
article thumbnail

Wave of Attacks on WordPress: Urgent Update for WP Statistics, WP Meta SEO, LiteSpeed Cache

Penetration Testing

WordPress, the world’s most popular content management system, is facing a wave of targeted attacks exploiting critical vulnerabilities in several plugins. The Fastly Security Research Team has issued an urgent warning, revealing that malicious... The post Wave of Attacks on WordPress: Urgent Update for WP Statistics, WP Meta SEO, LiteSpeed Cache appeared first on Penetration Testing.

article thumbnail

SASE Threat Report: 8 Key Findings for Enterprise Security

The Hacker News

Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations require a holistic analysis across external data, inbound and outbound threats and network activity. This will enable evaluating the true state of cybersecurity in the enterprise.

article thumbnail

Verizon users report blurry photos in Android messaging apps

Bleeping Computer

Verizon customers using Android phones report that they receive blurry images through text messages on different services and apps, with no response from Verizon as to why. [.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

CVE-2024-29415: Popular Node.js Package ‘node-ip’ Exposes Millions to Potential SSRF Attacks

Penetration Testing

A significant security vulnerability has been uncovered in the widely-used node-ip npm package, which is designed to retrieve a computer’s IPv4 addresses via a simple command-line tool. This package, which boasts over 19 million... The post CVE-2024-29415: Popular Node.js Package ‘node-ip’ Exposes Millions to Potential SSRF Attacks appeared first on Penetration Testing.

article thumbnail

Microsoft India’s X account hijacked in Roaring Kitty crypto scam

Bleeping Computer

The official Microsoft India account on Twitter, with over 211,000 followers, was hijacked by cryptocurrency scammers to impersonate Roaring Kitty, the handle used by notorious meme stock trader Keith Gill. [.

article thumbnail

WhatsApp cryptocurrency scam goes for the cash prize

Malwarebytes

This weekend a scammer tried his luck by reaching out to me on WhatsApp. It’s not that I don’t appreciate it, but trust me, it’s bad for your business. I received one message from a number hailing from the Togolese Republic. WhatsApp message from an unknow sender “Jay, your financial account has been added. Account Csy926. Password [ **] USDT Balance 1,660,086.50 EUR: 592,030.92 [domain] Keep it in a safe place.

article thumbnail

CVE-2024-21512: MySQL2 Vulnerability Puts Millions of Downloads at Risk

Penetration Testing

MySQL2, a popular MySQL client library for Node.js with over 2 million monthly downloads, has been found to contain a severe security vulnerability that could leave countless applications at risk. Tracked as CVE-2024-21512 and... The post CVE-2024-21512: MySQL2 Vulnerability Puts Millions of Downloads at Risk appeared first on Penetration Testing.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.