Tue.Jul 16, 2024

article thumbnail

PureVPN vs NordVPN (2024): Which VPN Should You Choose?

Tech Republic Security

While PureVPN’s more affordable starting plan may be enticing, NordVPN’s stronger security and broader server fleet makes the higher price tag worth the money.

VPN 160
article thumbnail

Malicious npm Packages Found Using Image Files to Hide Backdoor Code

The Hacker News

Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor code to execute malicious commands sent from a remote server. The packages in question – img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy – have been downloaded 190 and 48 times each. As of writing, they have been taken down by the npm security team.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Email addresses of 15 million Trello users leaked on hacking forum

Bleeping Computer

A threat actor has released over 15 million email addresses associated with Trello accounts that were collected using an unsecured API in January. [.

Hacking 141
article thumbnail

Critical Apache HugeGraph Vulnerability Under Attack - Patch ASAP

The Hacker News

Threat actors are actively exploiting a recently disclosed critical security flaw impacting Apache HugeGraph-Server that could lead to remote code execution attacks. Tracked as CVE-2024-27348 (CVSS score: 9.8), the vulnerability impacts all versions of the software before 1.3.0. It has been described as a remote command execution flaw in the Gremlin graph traversal language API.

Software 141
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Active Exploits Targeting Apache HugeGraph Flaw (CVE-2024-27348): PoC Code Released

Penetration Testing

A remote code execution (RCE) vulnerability, tracked as CVE-2024-27348, is currently under active exploitation in the wild, targeting Apache HugeGraph-Server deployments. This discovery comes from the Shadowserver Foundation, a non-profit cybersecurity organization that has... The post Active Exploits Targeting Apache HugeGraph Flaw (CVE-2024-27348): PoC Code Released appeared first on Cybersecurity News.

article thumbnail

Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer

The Hacker News

An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a recently disclosed security flaw in the Microsoft MHTML browser engine as a zero-day to deliver an information stealer called Atlantida.

LifeWorks

More Trending

article thumbnail

Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks

The Hacker News

The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its arsenal, Microsoft has revealed. Scattered Spider is the designation given to a threat actor that's known for its sophisticated social engineering schemes to breach targets and establish persistence for follow-on exploitation and data theft.

article thumbnail

Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen)

Security Boulevard

DeFAIL: Cryptocurrency fans lose their worthless tokens via phishing attacks on decen­tral­ized finance sites. The post Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen) appeared first on Security Boulevard.

Hacking 131
article thumbnail

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

The Hacker News

The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access.

article thumbnail

CISA adds OSGeo GeoServer GeoTools bug to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds an OSGeo GeoServer GeoTools bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an OSGeo GeoServer GeoTools eval injection vulnerability, tracked as CVE-2024-36401 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.

Hacking 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Threat Prevention & Detection in SaaS Environments - 101

The Hacker News

Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them. According to the US Cybersecurity and Infrastructure Security Agency (CISA), 90% of all cyberattacks begin with phishing, an identity-based threat.

Phishing 130
article thumbnail

Why SMB Security Needs Efficient Device Management

Security Boulevard

SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels. The post Why SMB Security Needs Efficient Device Management appeared first on Security Boulevard.

IoT 128
article thumbnail

'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins

The Hacker News

Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software development kit (SDK) associated with a Russia-based ad network called CaramelAds.

article thumbnail

Report Identifies More Than 250 Evil Twin Mobile Applications

Security Boulevard

The Satori Threat Intelligence Team funded by HUMAN Security, a provider of a platform thwarting bot-based attacks, today disclosed it has uncovered a massive ad fraud operation involving the setting up of “evil twins” of applications found in the Google Play Store. The post Report Identifies More Than 250 Evil Twin Mobile Applications appeared first on Security Boulevard.

Mobile 128
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Kaspersky offers free security software for six months in U.S. goodbye

Bleeping Computer

Kaspersky is offering free security products for six months and tips for staying safe as a parting gift to consumers in the United States. [.

Software 118
article thumbnail

Patagonia Sued for Using AI-Based Software to Analyze Customer Calls

Security Boulevard

A class-action lawsuit claims that outdoor clothing retailer Patagonia violated plaintiffs' privacy rights by letting Talkdesk's AI-based call center products record, store, and analyze customer conversations without their knowledge or consent. The post Patagonia Sued for Using AI-Based Software to Analyze Customer Calls appeared first on Security Boulevard.

Software 124
article thumbnail

Exploiting a Generative AI Chatbot – Prompt Injection to Remote Code Execution (RCE)

NetSpi Technical

The NetSPI Agents The NetSPI Agents have encountered various chatbot services that utilize a large language model (LLM). LLMs are advanced AI systems developed by training on extensive text corpora, including books, articles, and websites. They can be adapted for various applications, such as question-answering, analysis, and interactive chatbots. NetSPI created an interactive chatbot that consists of common vulnerabilities seen in LLMs including prompt injection which can be leveraged by an att

article thumbnail

Hotel Wi-Fi: A Hotspot for Cyber Threats

Security Boulevard

Wi-Fi has become an essential utility, one we expect to access wherever we go. It’s particularly true for hotels, where guests expect seamless internet connectivity – to do their jobs while traveling, to stream entertainment while on vacation, to search for local experiences or restaurants when traveling. However, this convenience comes with a significant risk: […] The post Hotel Wi-Fi: A Hotspot for Cyber Threats appeared first on BlackCloak | Protect Your Digital Life™.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AI device Rabbit r1 logged user interactions without an option to erase them before selling

Malwarebytes

Rabbit, the manufacturer of the Artificial Intelligence (AI) assistant r1 has issued a security advisory telling users it’s found a potential security risk. If a user loses or sells their device, a person in possession of the r1 could potentially jailbreak the device and gain access to files that contain logging information, chats, and photos.

article thumbnail

Russian Antivirus Firm Kaspersky Shuts Down U.S. Operations After Ban

Security Boulevard

A month after the U.S. Commerce Department banned it from selling its security software in the country, Russian company Kaspersky Lab said it is shuttering its U.S. operations and laying off staff in the country by July 20. The post Russian Antivirus Firm Kaspersky Shuts Down U.S. Operations After Ban appeared first on Security Boulevard.

Antivirus 118
article thumbnail

Microsoft announces new Windows 'checkpoint' cumulative updates

Bleeping Computer

Microsoft will introduce checkpoint cumulative updates starting in late 2024 for systems running devices running Windows Server 2025 and Windows 11, version 24H2 or later. [.

112
112
article thumbnail

Disney's Slack Breached, Sensitive Data Leaked by Hackers

SecureWorld News

Disney recently announced a data breach involving its internal Slack workplace collaboration system. The leak has exposed sensitive information, including discussions about ad campaigns, studio technology, and interview candidates. The incident underscores the growing challenges of securing digital collaboration tools in the modern workplace. Disney, one of the world's largest entertainment companies, revealed that data from its Slack workspace had been leaked online.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft finally fixes Outlook alerts bug caused by December updates

Bleeping Computer

Microsoft has finally fixed a known Outlook issue, confirmed in February, which was triggering incorrect security alerts after installing the December security updates for Outlook Desktop. [.

108
108
article thumbnail

Provisioning IntranetSSL Certificates for Internal Domains Through ACME

GlobalSign

Discover updates to GlobalSign’s ACME service for issuing intranet SSL certificates, what it means and why they are important.

105
105
article thumbnail

The Potential Impact of the OpenSSH Vulnerabilities CVE-2024–6387 and CVE-2024-6409

Trend Micro

We check the OpenSSH vulnerabilities CVE-2024–6387 and CVE-2024-6409, examining their potential real-world impact and the possibility of exploitation for CVE-2024–6387 in x64 systems.

article thumbnail

Microsoft links Scattered Spider hackers to Qilin ransomware attacks

Bleeping Computer

Microsoft says the Scattered Spider cybercrime gang has added Qilin ransomware to its arsenal and is now using it in attacks. [.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The AI Fix #7: Can AIs speak dolphin and do robots lick toads?

Graham Cluley

In episode seven of The AI Fix, Alexa goes wild, Mark learns how to hang a towel on a Peloton for only $39.90 a month, Graham puts the news items in the wrong order, and a strawberry uses the internet. Graham explains to Mark what bats argue about, our hosts ponder whether AI should always write in Comic Sans, and Mark tells Graham why AIs are like dolphins that smoke pufferfish.

article thumbnail

Rite Aid says June data breach impacts 2.2 million people

Bleeping Computer

Rite Aid, the third-largest drugstore chain in the United States, says that 2.2 million customers' personal information was stolen last month in what it described as a "data security incident." [.

article thumbnail

API Transformation Cyber Risks and Survival Tactics

Security Boulevard

As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data associated with them. The post API Transformation Cyber Risks and Survival Tactics appeared first on Security Boulevard.

article thumbnail

Protecting Against regreSSHion with Secure Workload

Cisco Security

The regreSSHion vulnerability has taken the internet by storm. Learn how Secure Workload can protect your organization from this and other vulnerabilities. The regreSSHion vulnerability has taken the internet by storm. Learn how Secure Workload can protect your organization from this and other vulnerabilities.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!