Wed.Dec 11, 2024

article thumbnail

AMD Chip VM Memory Protections Broken by BadRAM

Security Boulevard

Researchers in Europe unveil a vulnerability dubbed "BadRAM" that hackers can easily exploit using $10 hardware to bypass protections in AMD's Eypc server processors used in cloud environments and expose sensitive data stored in memory. The post AMD Chip VM Memory Protections Broken by BadRAM appeared first on Security Boulevard.

article thumbnail

Ivanti fixed a maximum severity vulnerability in its CSA solution

Security Affairs

Ivanti addressed a critical authentication bypass vulnerability impacting its Cloud Services Appliance (CSA) solution. Ivanti addressed a critical authentication bypass vulnerability, tracked as CVE-2024-11639 (CVSS score of 10), in its Cloud Services Appliance (CSA) solution. A remote unauthenticated attacker can exploit the vulnerability to gain administrative access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Jailbreaking LLM-Controlled Robots

Schneier on Security

Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions.

article thumbnail

Oasis Security Details MFA Security Flaw Found in Microsoft Cloud Services

Security Boulevard

Oasis Security today revealed that it worked with Microsoft to fix a flaw in its implementation of multi-factor authentication (MFA) that could have been used by cybercriminals to gain access to every major Microsoft cloud service The post Oasis Security Details MFA Security Flaw Found in Microsoft Cloud Services appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Chinese national charged for hacking thousands of Sophos firewalls

Security Affairs

The U.S. has charged a Chinese national for hacking thousands of Sophos firewall devices worldwide in 2020. The U.S. has charged the Chinese national Guan Tianfeng (aka gbigmao and gxiaomao) for hacking thousands of Sophos firewall devices worldwide in 2020. Tianfeng worked at Sichuan Silence Information Technology Co., faces charges for developing and testing a zero-day exploit used to compromise approximately 81,000 firewalls.

article thumbnail

Cybersecurity Products or Platforms – Which is More Effective?

Security Boulevard

Understanding the nuances between cybersecurity products and platforms is crucial for enhancing business protections and supporting businesses anywhere. The post Cybersecurity Products or Platforms – Which is More Effective? appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others

Tech Republic Security

December marked a quiet month with 70 vulnerabilities patched, plus updates from outside of Microsoft.

Software 158
article thumbnail

CVE-2020-12271 Exploited: FBI Seeks Chinese Hacker Behind 81,000 Device Breach

Penetration Testing

The US Department of Justice announced the unsealing of an indictment against Guan Tianfeng, a Chinese national associated with Sichuan Silence Information Technology Co. Ltd., for his alleged role in... The post CVE-2020-12271 Exploited: FBI Seeks Chinese Hacker Behind 81,000 Device Breach appeared first on Cybersecurity News.

article thumbnail

U.K. cybersecurity chief warns of gap between risks and defenses

Security Boulevard

A warning issued by the new head the United Kingdom's National Cyber Security Centre (NCSC) should be sobering to cybersecurity pros everywhere. Speaking at the agency's headquarters on Tuesday, Richard Horne declared that the cyber-risks faced by his nation and its allies are widely underestimated. The post U.K. cybersecurity chief warns of gap between risks and defenses appeared first on Security Boulevard.

Risk 59
article thumbnail

US Sanctions Chinese Cybersecurity Firm for 2020 Ransomware Attack

Tech Republic Security

Chinese cybersecurity firm Sichuan Silence has been sanctioned for exploiting a vulnerability in Sophos firewalls used at critical infrastructure organizations in the U.S.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CVE-2024-53247: Splunk Secure Gateway App Vulnerability Allows Remote Code Execution

Penetration Testing

A critical vulnerability has been discovered in the Splunk Secure Gateway app that could allow a low-privileged user to execute arbitrary code on vulnerable systems. The vulnerability, identified as CVE-2024-53247... The post CVE-2024-53247: Splunk Secure Gateway App Vulnerability Allows Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value?

Tech Republic Security

Compare CrowdStrike and Wiz on cloud security, features, pricing, and performance to find the best cybersecurity solution for your business needs.

article thumbnail

CVE-2024-53677 (CVSS 9.5): Critical Vulnerability in Apache Struts Allows Remote Code Execution

Penetration Testing

Developers using the popular Apache Struts framework are urged to update their systems immediately following the discovery of a critical security flaw (CVE-2024-53677, CVSS 9.5) that could allow attackers to... The post CVE-2024-53677 (CVSS 9.5): Critical Vulnerability in Apache Struts Allows Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

Keeper Password Manager Review (2024): Features, Pros, & Cons

Tech Republic Security

Keepers extensive authentication options and generous discounts make it an alluring password manager to try this year. Read more about it in our full review.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

The Hacker News

Cybersecurity researchers have flagged a "critical" security vulnerability in Microsoft's multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim's account.

article thumbnail

CrowdStrike vs Palo Alto 2024: Features, Pricing, and Insights

Tech Republic Security

Compare CrowdStrike and Palo Alto Networks in this in-depth article, exploring features, pricing, usability, and performance to find the right solution for your business.

130
130
article thumbnail

Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

The Hacker News

Cybersecurity researchers have discovered a novel surveillance program that's suspected to be used by Chinese police departments as a lawful intercept tool to gather a wide range of information from mobile devices.

Mobile 130
article thumbnail

EagleMsgSpy: Unmasking a Sophisticated Chinese Surveillance Tool

Penetration Testing

Researchers at the Lookout Threat Lab have identified a sophisticated surveillance tool, dubbed EagleMsgSpy, reportedly used by law enforcement agencies in mainland China. The tool, operational since at least 2017,... The post EagleMsgSpy: Unmasking a Sophisticated Chinese Surveillance Tool appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

The Hacker News

A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious activities without tipping off endpoint detection and response (EDR) solutions. "To exploit this technique, a user must be convinced to run a program that uses UI Automation," Akamai security researcher Tomer Peled said in a report shared with The Hacker News.

Malware 126
article thumbnail

Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025

Security Boulevard

One of the most significant regulatory mandates on the horizon is the European Unions Digital Operational Resilience Act (DORA). The post Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025 appeared first on Security Boulevard.

article thumbnail

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

The Hacker News

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. "Zloader 2.9.4.

DNS 125
article thumbnail

Top 10 Web Design Security Best Practices to Follow in 2025

Security Boulevard

This blog explores ten essential web design security practices every developer and business should adopt to stay ahead of potential attacks. The post Top 10 Web Design Security Best Practices to Follow in 2025 appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia

The Hacker News

A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023.

article thumbnail

CrowdStrike vs Splunk: Which SIEM Solution Is Right for You?

Tech Republic Security

Compare CrowdStrike and Splunk, two leading SIEM solutions, focusing on their features, strengths, and differences in cybersecurity effectiveness.

article thumbnail

Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested

The Hacker News

A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and took them offline as part of a multi-year international exercise called PowerOFF. The effort, coordinated by Europol and involving 15 countries, dismantled several booter and stresser websites, including zdstresser.net, orbitalstress.

DDOS 121
article thumbnail

AI: Overhyped or Essential for the Workforce?

Security Boulevard

The post AI: Overhyped or Essential for the Workforce? appeared first on AI-Enhanced Security Automation. The post AI: Overhyped or Essential for the Workforce? appeared first on Security Boulevard.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service

The Hacker News

The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine.

Malware 101
article thumbnail

The best all-in-one computers of 2025: Expert tested and reviewed

Zero Day

We tested the best all-in-one computers that combine the power of a desktop PC with a slim, lightweight design.

81
article thumbnail

Understanding and Taking Advantage of the NYDFS Risk Assessment Requirement

Security Boulevard

As organizations prepare for the coming year those affected by NYDFS may struggle to efficiently include the requirements in their [] The post Understanding and Taking Advantage of the NYDFS Risk Assessment Requirement appeared first on Security Boulevard.

Risk 78
article thumbnail

PoC Exploit Code Releases Cleo Zero-Day Vulnerability (CVE-2024-50623)

Penetration Testing

Organizations using Cleo file transfer software are urged to take immediate action as a critical vulnerability, CVE-2024-50623, is being actively exploited in the wild. This zero-day flaw affects Cleo LexiCom,... The post PoC Exploit Code Releases Cleo Zero-Day Vulnerability (CVE-2024-50623) appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!