Mon.Dec 09, 2024

article thumbnail

Encrypted messaging service intercepted, 2.3 million messages read by law enforcement

Malwarebytes

European law enforcement agencies have taken down yet another encrypted messaging service mainly used by criminals. The Matrix encrypted messaging service was an invite-only service which was also marketed under the names Mactrix, Totalsec, X-quantum, or Q-safe. Dutch and French authorities started an investigation when the service was found on the phone of a criminal convicted for the murder of Dutch journalist Peter R. de Vries in 2021.

article thumbnail

Romanian energy supplier Electrica Group is facing a ransomware attack

Security Affairs

Romanian energy supplier Electrica Group is investigating an ongoing ransomware attack impacting its operations. Romanian energy supplier Electrica Group suffered a cyber attack that is impacting its operations. The company assured investors that the attack hadn’t affected its critical systems, but temporary disruptions in customer services might occur due to enhanced security protocols.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantum Computing: An Impending Threat to the Current PKI Systems

Security Boulevard

By proactively assessing vulnerabilities and planning for the integration of quantum-resistant cryptographic solutions, enterprises can safeguard their digital assets against future threats. The post Quantum Computing: An Impending Threat to the Current PKI Systems appeared first on Security Boulevard.

article thumbnail

Prepare for 2025 with This CompTIA Training Bundle for $50

Tech Republic Security

Learn at your own pace from your own space with lifetime Access to 310+ hours of learning from IT experts.

132
132
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Mandiant devised a technique to bypass browser isolation using QR codes

Security Affairs

Mandiant revealed a technique to bypass browser isolation using QR codes, enabling command transmission from C2 servers. Browser isolation is a security measure that separates web browsing from the user’s device by running the browser in a secure environment (e.g., cloud or VM) and streaming visuals. Mandiant has identified a new technique for bypassing browser isolation technology and using QR codes to send commands from C2 to compromised devices.

article thumbnail

The Role of USB Security in Combating Insider Threats

Security Boulevard

This blog post explores how maintaining USB security mitigates insider threats and fosters a secure workplace environment. The post The Role of USB Security in Combating Insider Threats appeared first on Security Boulevard.

Software 132

More Trending

article thumbnail

We Need to Encrypt Clinical Trial Data

Security Boulevard

As we push the boundaries of medical science through innovative clinical trials, we must recognize that data security is not just an IT issue. The post We Need to Encrypt Clinical Trial Data appeared first on Security Boulevard.

article thumbnail

CVE-2024-11205: WPForms Plugin Vulnerability Impacts 6 Million WordPress Sites

Penetration Testing

A critical vulnerability (CVE-2024-11205) discovered in WPForms, a prevalent WordPress form builder plugin with over 6 million active installations, exposed websites to significant financial risk. The vulnerability, assigned a CVSS... The post CVE-2024-11205: WPForms Plugin Vulnerability Impacts 6 Million WordPress Sites appeared first on Cybersecurity News.

Risk 112
article thumbnail

Story of the Year: global IT outages and supply chain attacks

SecureList

A faulty update by cybersecurity firm CrowdStrike triggered one of the largest IT outages in history, impacting approximately 8.5 million systems worldwide. This incident serves as a stark reminder of the critical risks posed by global IT disruptions and supply chain weaknesses. With large-scale security crises being one of the most relevant threats worldwide, it’s more important than ever to reflect on past events, assess emerging threats, and, most crucially, explore strategies to preven

article thumbnail

Anna Jaques Hospital Ransomware Breach Exposes Patient Data

ZoneAlarm

Ransomware attacks continue to disrupt industries worldwide, with healthcare remaining a high-profile target due to the sensitivity and critical nature of its data. Anna Jaques Hospital experienced a ransomware attack in late 2023, exposing confidential information of over 310,000 patients. Recently, the incident returned to the spotlight due to new updates on the breachs scope … The post Anna Jaques Hospital Ransomware Breach Exposes Patient Data appeared first on ZoneAlarm Security Blog.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Police Arrest UHC CEO Shooting Suspect, App Developer Luigi Mangione

WIRED Threat Level

Luigi Mangione, a 26-year-old graduate of the University of Pennsylvania, was apprehended on Monday after visiting a McDonald's in Altoona, Pennsylvania.

98
article thumbnail

Shared Intel Q&A: A thriving ecosystem now supports AWS ‘shared responsibility’ security model

The Last Watchdog

The Amazon Web Services (AWS) Shared Responsibility Model has come a long way, indeed. Related: Shared Responsibility best practices In 2013, Amazon planted a stake in the ground when it divided cloud security obligations between AWS and its patrons, guaranteeing the integrity of its infrastructure, but placing a huge burden on customers to secure things on their end.

Marketing 100
article thumbnail

Deloitte denied its systems were hacked by Brain Cipher ransomware group

Security Affairs

Deloitte has responded to claims by the Brain Cipher ransomware group, which alleges the theft of over 1 terabyte of the company’s data. Recently, the ransomware group Brain Cipher added Deloitte UK to its Tor leak site. The gang claimed to have stolen one terabyte of compressed data from the company. A Deloitte spokesperson addressed claims made by the ransomware gang, stating that the source of data is a single client’s system, which is not linked to the company’s network.

Hacking 94
article thumbnail

Why CISOs Are Stepping Away and What the Future Holds

SecureWorld News

The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities. Yet, these pressures have led to significant turnover, with many CISOs stepping away from their roles.

CISO 77
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Maximizing SAP Security: How AI and Human Intervention Work

Security Boulevard

Tips toward improving the security rating of your code base while preventing any new vulnerabilities from appearing in your SAP landscape. The post Maximizing SAP Security: How AI and Human Intervention Work appeared first on Security Boulevard.

article thumbnail

Bulletproof Hosting: The Dark Infrastructure Behind Global Cybercrime

Penetration Testing

A recent report by the Knownsec 404 team highlights the pivotal role of bulletproof hosting services in facilitating global cybercriminal activities. These specialized hosting providers, often referred to as “dark... The post Bulletproof Hosting: The Dark Infrastructure Behind Global Cybercrime appeared first on Cybersecurity News.

article thumbnail

The Future of Cybersecurity Marketing: AI-Driven Strategies for 2025 and Beyond

Security Boulevard

From predictive analytics to hyper-personalized content delivery, organizations are reimagining how they communicate security solutions. Discover how AI is revolutionizing cybersecurity marketing strategies for 2025 and beyond. The post The Future of Cybersecurity Marketing: AI-Driven Strategies for 2025 and Beyond appeared first on Security Boulevard.

article thumbnail

Top 5 reasons MSPs choose OpenText MDR

Webroot

Its an exciting time to be a managed service provider (MSP). More than ever, small and medium businesses (SMBs) are looking to MSPs as trusted advisors to help safeguard them from todays growing cyber threats. One of the services in high demand right now? Managed detection and response (MDR). When asked about their biggest growth drivers, MSPs cite addressing clients cybersecurity concerns and awareness as the top new-business drivers (54%). 1 For MSPs, adding MDR to your lineup can create new r

Backups 73
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

5 Tips to Translate High-Level Risk Into Daily Operations

Security Boulevard

By following these five tips and leveraging a cybersecurity data fabric with an automated metrics layer, organizations can unify their risk assessment and operational efforts, leading to more cohesive and efficient risk management. The post 5 Tips to Translate High-Level Risk Into Daily Operations appeared first on Security Boulevard.

Risk 106
article thumbnail

CVE-2024-50623: Critical Vulnerability in Cleo Software Actively Exploited in the Wild

Penetration Testing

Huntress Labs has raised the alarm over the active exploitation of a critical vulnerability (CVE-2024-50623) in Cleos Harmony, VLTrader, and LexiCom software, commonly used for managing file transfers. Threat actors... The post CVE-2024-50623: Critical Vulnerability in Cleo Software Actively Exploited in the Wild appeared first on Cybersecurity News.

article thumbnail

AWS Makes Significant Progress on Driving MFA Adoption

Security Boulevard

Amazon Web Services (AWS) is reporting that since last April more than 750,000 root user accounts on its AWS Organizations console for managing access to cloud services have enabled multifactor authentication (MFA). The post AWS Makes Significant Progress on Driving MFA Adoption appeared first on Security Boulevard.

article thumbnail

Radiant Capital Incident: $50M Cyber Heist Linked to North Korean Threat Actors

Penetration Testing

A new report from Radiant Capital provides a detailed analysis of the sophisticated cyberattack that led to the theft of approximately $50 million USD on October 16, 2024. The findings,... The post Radiant Capital Incident: $50M Cyber Heist Linked to North Korean Threat Actors appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Link Trap: GenAI Prompt Injection Attack

Trend Micro

Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected.

article thumbnail

International Operation Dismantles Phone Phishing Ring Targeting Vulnerable Individuals Across Europe

Penetration Testing

A sophisticated phone phishing operation targeting vulnerable individuals, primarily the elderly, has been dismantled in a joint operation conducted by Belgian and Dutch law enforcement agencies, with support from Europol... The post International Operation Dismantles Phone Phishing Ring Targeting Vulnerable Individuals Across Europe appeared first on Cybersecurity News.

article thumbnail

Why Unified Endpoint Management Is Non-Negotiable for IT Teams in 2025

Heimadal Security

Meet Linda, the CFO of a multinational company. She is currently on her way to a business conference on the other side of the world. Linda makes many more trips like this these days. Once upon a time, jet-setting across the world meant no access to files, emails, or messages for the whole time she […] The post Why Unified Endpoint Management Is Non-Negotiable for IT Teams in 2025 appeared first on Heimdal Security Blog.

65
article thumbnail

Meeten Malware: AI-Powered Cyber Campaign Targets Web3 Professionals

Penetration Testing

Cado Security Labs has uncovered a highly sophisticated cyber campaign targeting professionals in the Web3 space. At the heart of this campaign lies the Meeten malware, a cross-platform information stealer... The post Meeten Malware: AI-Powered Cyber Campaign Targets Web3 Professionals appeared first on Cybersecurity News.

Malware 65
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide

Security Boulevard

What is OSCAL? OSCAL provides a traceable and machine-readable data format for capturing and sharing security information. A standardized, continuous representation of an organizations security controls helps prove compliance with NISTs risk management framework for mandated federal agencies. FedRAMP joined with NIST to create the Open Security Controls Assessment Language (OSCAL), a standard that can [] The post Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide appeared

Risk 59
article thumbnail

SpyNote RAT Targets High-Value Individuals in Southern Asia

Penetration Testing

Cybersecurity researchers at CYFIRMA have uncovered a sophisticated cyberattack targeting high-value individuals in Southern Asia. Leveraging the SpyNote Remote Administration Tool (RAT), an unknown threat actor designed a malicious Android... The post SpyNote RAT Targets High-Value Individuals in Southern Asia appeared first on Cybersecurity News.

article thumbnail

SpyLoan Malware: A Growing Threat to Android Users

Security Boulevard

The rise in android users has transformed how individuals and businesses access financial services, offering convenience and speed like never before. However, this rapid digitalization has also made these platforms a prime target for hackers. SpyLoan malware is a threat specifically engineered to exploit vulnerabilities in digital lending ecosystems.

Malware 59
article thumbnail

CVE-2024-12254: CPython Flaw Could Lead to Memory Exhaustion in asyncio Applications

Penetration Testing

A high-severity vulnerability (CVE-2024-12254) has been discovered in CPython, the reference implementation of the Python programming language. This vulnerability, with a CVSSv4 score of 8.7, affects versions 3.12.0 and later... The post CVE-2024-12254: CPython Flaw Could Lead to Memory Exhaustion in asyncio Applications appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.