Tue.Aug 27, 2024

article thumbnail

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director , a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon , a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

Internet 314
article thumbnail

The Present and Future of TV Surveillance

Schneier on Security

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly 1/3 of Companies Suffered a SaaS Data Breach in Last Year

Tech Republic Security

The number of organisations that experienced a SaaS data breach in the last 12 months is 5% higher than the previous year according to AppOmni.

article thumbnail

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials

The Hacker News

Cybersecurity researchers are calling attention to a new QR code phishing (aka quishing) campaign that leverages Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse of legitimate cloud offerings for malicious purposes.

Phishing 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked as CVE-2024-39717 , in Versa Director, to deploy a custom webshell on breached networks. Versa Director is a centralized management and orchestration platform used primarily by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to manage and monitor Software-Defined Wide Area N

article thumbnail

Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

The Hacker News

The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed high-severity security flaw impacting Versa Director. The attacks targeted four U.S. victims and one non-U.S.

Internet 140

More Trending

article thumbnail

macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

The Hacker News

Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT. The artifacts "almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers' server," Kaspersky researcher Sergey Puzan said.

139
139
article thumbnail

Critical flaw in WPML WordPress plugin impacts 1M websites

Security Affairs

A critical flaw in the WPML WordPress plugin, which is installed on 1 million websites, could allow potential compromise of affected sites. The WPML Multilingual CMS Plugin for WordPress is installed on over 1 million sites. An authenticated (Contributor+) Remote Code Execution (RCE) vulnerability, tracked CVE-2024-6386 (CVSS score of 9.9), in WPML Plugin potentially allows the compromise of impacted websites.

article thumbnail

Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution

The Hacker News

A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute arbitrary code remotely under certain circumstances. The vulnerability, tracked as CVE-2024-6386 (CVSS score: 9.9), impacts all versions of the plugin before 4.6.13, which was released on August 20, 2024.

article thumbnail

The 5 Best Free Endpoint Protection Platforms for 2024

Tech Republic Security

Discover our top picks for reputable free endpoint protection platforms and compare their features, pros and cons in this in-depth guide.

131
131
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

TDECU data breach affects half a million people

Malwarebytes

The Texas Dow Employees Credit Union (TDECU) has filed a data breach notification , reporting that the data of 500,474 people has been accessed in an external system breach. TDECU is the largest Houston-area credit union, and the fourth largest in the state of Texas. The credit union was founded by employees of Dow Chemical Company in December 1954 and membership was initially limited to Dow and Ethyl-Dow employees.

article thumbnail

HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat

SecureList

In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of the enterprise messenger DingTalk and the social network and messaging platform WeChat. The samples we found almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server.

Malware 130
article thumbnail

CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw affecting the Apache OFBiz open-source enterprise resource planning (ERP) system to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, known as CVE-2024-38856, carries a CVSS score of 9.8, indicating critical severity.

article thumbnail

Old devices, new dangers: The risks of unsupported IoT tech

We Live Security

Out-of-date Internet of Things (IoT) devices can easily become exploited by bad actors looking to use them for their own agenda.

IoT 127
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

LockBit, RansomHub Lead Ransomware Attacks in July

Security Boulevard

Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group. The post LockBit, RansomHub Lead Ransomware Attacks in July appeared first on Security Boulevard.

article thumbnail

PoC Exploit Released for Arbitrary File Write Flaw (CVE-2024-22263) in Spring Cloud Data Flow

Penetration Testing

Security researcher Zeyad Azima from SecureLayer7 published the proof-of-concept exploit for arbitrary file write vulnerability (CVE-2024-22263) in Spring Cloud Data Flow, a widely-used tool for cloud-based data processing. The flaw... The post PoC Exploit Released for Arbitrary File Write Flaw (CVE-2024-22263) in Spring Cloud Data Flow appeared first on Cybersecurity News.

article thumbnail

Facebook Whistleblower Fears Election Abuse

Security Boulevard

Frances Haugen, who famously blew the whistle on Facebook and its susceptibility to manipulation, has renewed concerns over the social-networking company. This time, she’s laser-focused on misinformation during the 2024 presidential election. “We are in a new, very nebulous era where we need to think more holistically and creatively” in defending cyberdefenses, Haugen said in.

article thumbnail

CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures

The Hacker News

Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations report takes important steps to organize and mature the domain of Continuous Threat Exposure Management, aka CTEM.

118
118
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

One-Third Of Companies Suffered SaaS Breach This Year

Security Boulevard

SaaS breaches are on the rise, and nearly half the corporate victims have more than 2,500 employees. Those are among the sobering conclusions from a survey of security experts at 644 organizations in six countries — the U.S., UK, France, Germany, Japan and Australia — by AppOmni, which found a third of organizations suffered a SaaS data.

article thumbnail

SSN, Banking Details at Risk in Major Texas Credit Union Breach

Penetration Testing

The largest credit union in Texas, Texas Dow Employees Credit Union (TDECU), has reported a significant data breach affecting more than 500,000 individuals. The incident may have compromised Social Security... The post SSN, Banking Details at Risk in Major Texas Credit Union Breach appeared first on Cybersecurity News.

Banking 115
article thumbnail

5 Key Takeaways: Ransomware Attacks on Healthcare, Education, and Public Sector

Security Boulevard

Ransomware has rapidly escalated from being a financial nuisance to a significant, multi-dimensional threat that jeopardizes the core of our most essential services. Sectors like healthcare, education, and government are particularly vulnerable, where a single attack can cripple critical operations, expose sensitive information, and, in the most severe cases, put lives at risk.

Education 118
article thumbnail

Sneak Peek: 2024 Europe Community Meeting Speakers

PCI perspectives

The excitement is building as we get closer to this year’s Europe Community Meeting ! To add to the anticipation, we’re giving you a sneak peek of some of the amazing sessions that will be featured in Barcelona, 8-10 October. Don't pass up the chance to collaborate and gain knowledge into the latest developments in payment security. The PCI SSC Community Meetings are open to all in the payments industry.

111
111
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem

Trend Micro

We provide a technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

article thumbnail

CVE-2024-37888 – CKEditor 4 Open Link plugin XSS

NetSpi Technical

At NetSPI, our mission is to uncover and mitigate security vulnerabilities before they can be exploited. This blog post explores the discovery of CVE-2024-37888 , a cross-site scripting (XSS) vulnerability in the CKEditor 4 Open Link plugin. We’ll discuss the nature of this vulnerability, how it was discovered, and its implications. What is CVE-2024-37888?

Software 107
article thumbnail

The AI Fix #13: ChatGPT runs for mayor, and should we stop killer robots?

Graham Cluley

In episode 13 of "The AI Fix"", meat avatar Cluley learns that AI doesn't pose an existential threat to humanity and tells meat avatar Stockley how cybersex is about to get very, very weird. Our hosts also learn that men lie on their dating profiles, hear ChatGPT steal somebody's voice, and discover an AI that rick rolls its users. Graham tells Mark about AI's political ambitions and discovers what ChatGPT has in common with the reluctant ruler of the universe, while Mark introduces Graham to th

article thumbnail

SEC Settles with Equiniti Trust for $850K Over Cybersecurity Failures

SecureWorld News

The U.S. Securities and Exchange Commission (SEC) recently reached a settlement with Equiniti Trust Company, formerly known as American Stock Transfer & Trust, following two separate cyber intrusions that resulted in the loss of $6.6 million in client funds. Equiniti has agreed to pay $850,000 to settle charges that it failed to implement sufficient cybersecurity measures to protect its clients' assets.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Poortry EDR Killer Evolves, Now Wipes Security Software From Windows Systems

Penetration Testing

Sophos X-Ops recently released a detailed report on the latest advancements in a malicious toolset known as Poortry, designed to sabotage endpoint detection and response (EDR) software on Windows systems.... The post Poortry EDR Killer Evolves, Now Wipes Security Software From Windows Systems appeared first on Cybersecurity News.

article thumbnail

What is an IoT Gateway and How Do I Keep it Secure?

GlobalSign

Learn how to better manage your IoT devices across a fleet of identities using IoT gateways, and how you can keep them secure using PKI solutions.

IoT 98
article thumbnail

What Is Cybersecurity Awareness Training? Why Your Business Needs it

Tech Republic Security

Organizations of all sizes are being targeted by bad actors, which is why cybersecurity awareness training is more important than ever. Unfortunately, most organizations are not motivated to implement such training. A study by IBM found that barely half (51%) of organizations that had already experienced a data breach in the past year planned to.

article thumbnail

Cryptojacking Campaign Exploits Atlassian Confluence CVE-2023-22527 Vulnerability

Penetration Testing

Trend Micro researchers have uncovered a widespread cryptojacking campaign leveraging a critical vulnerability (CVE-2023-22527) in the Atlassian Confluence Data Center and Server. Attackers are exploiting this flaw to install cryptocurrency... The post Cryptojacking Campaign Exploits Atlassian Confluence CVE-2023-22527 Vulnerability appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.