Tue.Aug 27, 2024

article thumbnail

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director , a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon , a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

Internet 301
article thumbnail

The Present and Future of TV Surveillance

Schneier on Security

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly 1/3 of Companies Suffered a SaaS Data Breach in Last Year

Tech Republic Security

The number of organisations that experienced a SaaS data breach in the last 12 months is 5% higher than the previous year according to AppOmni.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked as CVE-2024-39717 , in Versa Director, to deploy a custom webshell on breached networks. Versa Director is a centralized management and orchestration platform used primarily by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to manage and monitor Software-Defined Wide Area N

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

LockBit, RansomHub Lead Ransomware Attacks in July

Security Boulevard

Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group. The post LockBit, RansomHub Lead Ransomware Attacks in July appeared first on Security Boulevard.

article thumbnail

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials

The Hacker News

Cybersecurity researchers are calling attention to a new QR code phishing (aka quishing) campaign that leverages Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse of legitimate cloud offerings for malicious purposes.

Phishing 121

More Trending

article thumbnail

Critical flaw in WPML WordPress plugin impacts 1M websites

Security Affairs

A critical flaw in the WPML WordPress plugin, which is installed on 1 million websites, could allow potential compromise of affected sites. The WPML Multilingual CMS Plugin for WordPress is installed on over 1 million sites. An authenticated (Contributor+) Remote Code Execution (RCE) vulnerability, tracked CVE-2024-6386 (CVSS score of 9.9), in WPML Plugin potentially allows the compromise of impacted websites.

article thumbnail

One-Third Of Companies Suffered SaaS Breach This Year

Security Boulevard

SaaS breaches are on the rise, and nearly half the corporate victims have more than 2,500 employees. Those are among the sobering conclusions from a survey of security experts at 644 organizations in six countries — the U.S., UK, France, Germany, Japan and Australia — by AppOmni, which found a third of organizations suffered a SaaS data.

article thumbnail

Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

The Hacker News

The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed high-severity security flaw impacting Versa Director. The attacks targeted four U.S. victims and one non-U.S.

Internet 117
article thumbnail

5 Key Takeaways: Ransomware Attacks on Healthcare, Education, and Public Sector

Security Boulevard

Ransomware has rapidly escalated from being a financial nuisance to a significant, multi-dimensional threat that jeopardizes the core of our most essential services. Sectors like healthcare, education, and government are particularly vulnerable, where a single attack can cripple critical operations, expose sensitive information, and, in the most severe cases, put lives at risk.

Education 118
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

The Hacker News

Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT. The artifacts "almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers' server," Kaspersky researcher Sergey Puzan said.

117
117
article thumbnail

The 5 Best Free Endpoint Protection Platforms for 2024

Tech Republic Security

Discover our top picks for reputable free endpoint protection platforms and compare their features, pros and cons in this in-depth guide.

117
117
article thumbnail

Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution

The Hacker News

A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute arbitrary code remotely under certain circumstances. The vulnerability, tracked as CVE-2024-6386 (CVSS score: 9.9), impacts all versions of the plugin before 4.6.13, which was released on August 20, 2024.

article thumbnail

The AI Fix #13: ChatGPT runs for mayor, and should we stop killer robots?

Graham Cluley

In episode 13 of "The AI Fix"", meat avatar Cluley learns that AI doesn't pose an existential threat to humanity and tells meat avatar Stockley how cybersex is about to get very, very weird. Our hosts also learn that men lie on their dating profiles, hear ChatGPT steal somebody's voice, and discover an AI that rick rolls its users. Graham tells Mark about AI's political ambitions and discovers what ChatGPT has in common with the reluctant ruler of the universe, while Mark introduces Graham to th

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Sneak Peek: 2024 Europe Community Meeting Speakers

PCI perspectives

The excitement is building as we get closer to this year’s Europe Community Meeting ! To add to the anticipation, we’re giving you a sneak peek of some of the amazing sessions that will be featured in Barcelona, 8-10 October. Don't pass up the chance to collaborate and gain knowledge into the latest developments in payment security. The PCI SSC Community Meetings are open to all in the payments industry.

110
110
article thumbnail

PoC Exploit Released for Arbitrary File Write Flaw (CVE-2024-22263) in Spring Cloud Data Flow

Penetration Testing

Security researcher Zeyad Azima from SecureLayer7 published the proof-of-concept exploit for arbitrary file write vulnerability (CVE-2024-22263) in Spring Cloud Data Flow, a widely-used tool for cloud-based data processing. The flaw... The post PoC Exploit Released for Arbitrary File Write Flaw (CVE-2024-22263) in Spring Cloud Data Flow appeared first on Cybersecurity News.

article thumbnail

CVE-2024-37888 – CKEditor 4 Open Link plugin XSS

NetSpi Technical

At NetSPI, our mission is to uncover and mitigate security vulnerabilities before they can be exploited. This blog post explores the discovery of CVE-2024-37888 , a cross-site scripting (XSS) vulnerability in the CKEditor 4 Open Link plugin. We’ll discuss the nature of this vulnerability, how it was discovered, and its implications. What is CVE-2024-37888?

Software 107
article thumbnail

SSN, Banking Details at Risk in Major Texas Credit Union Breach

Penetration Testing

The largest credit union in Texas, Texas Dow Employees Credit Union (TDECU), has reported a significant data breach affecting more than 500,000 individuals. The incident may have compromised Social Security... The post SSN, Banking Details at Risk in Major Texas Credit Union Breach appeared first on Cybersecurity News.

Banking 114
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Researchers unmasked the notorious threat actor USDoD

Security Affairs

CrowdStrike researchers have identified the notorious hacker USDoD who is behind several high-profile data leaks. The notorious hacker USDoD (aka EquationCorp), who is known for high-profile data leaks, is a man from Brazil, according to a CrowdStrike investigation. The news was first reported by the Brazilian website TecMundo who received a CrowdStrike report via an anonymous source.

Media 125
article thumbnail

HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat

SecureList

In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of the enterprise messenger DingTalk and the social network and messaging platform WeChat. The samples we found almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers’ server.

Malware 106
article thumbnail

How Does a VPN Work? A Comprehensive Beginner’s Overview

eSecurity Planet

A virtual private network (VPN) does more than just mask your identity—it fundamentally changes how your data moves across the internet. But what’s really going on under the hood when you browse the web using a VPN? Understanding this can be crucial for IT managers and professionals who are keen on maintaining robust cybersecurity practices. In this article, we’ll explain how a VPN works, explore its encryption mechanisms, review common VPN protocols, and discuss its various business appli

VPN 103
article thumbnail

What Is Cybersecurity Awareness Training? Why Your Business Needs it

Tech Republic Security

Organizations of all sizes are being targeted by bad actors, which is why cybersecurity awareness training is more important than ever. Unfortunately, most organizations are not motivated to implement such training. A study by IBM found that barely half (51%) of organizations that had already experienced a data breach in the past year planned to.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Vulnerability Recap 8/27/24 – Wide Range of Vulnerabilities This Week

eSecurity Planet

If you updated Chrome and SolarWinds Web Help Desk in the last couple of weeks due to vulnerabilities, get ready to update them again — each has a new flaw. Additionally, a popular WordPress plugin has a critical issue, and AWS’s Application Load Balancer feature has a configuration vulnerability. As always, the best way to get flaws quickly patched is to scan for vulnerabilities frequently and have a plan for fixing and documenting them.

article thumbnail

CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw affecting the Apache OFBiz open-source enterprise resource planning (ERP) system to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, known as CVE-2024-38856, carries a CVSS score of 9.8, indicating critical severity.

article thumbnail

Old devices, new dangers: The risks of unsupported IoT tech

We Live Security

Out-of-date Internet of Things (IoT) devices can easily become exploited by bad actors looking to use them for their own agenda.

IoT 116
article thumbnail

TDECU data breach affects half a million people

Malwarebytes

The Texas Dow Employees Credit Union (TDECU) has filed a data breach notification , reporting that the data of 500,474 people has been accessed in an external system breach. TDECU is the largest Houston-area credit union, and the fourth largest in the state of Texas. The credit union was founded by employees of Dow Chemical Company in December 1954 and membership was initially limited to Dow and Ethyl-Dow employees.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

SEC Settles with Equiniti Trust for $850K Over Cybersecurity Failures

SecureWorld News

The U.S. Securities and Exchange Commission (SEC) recently reached a settlement with Equiniti Trust Company, formerly known as American Stock Transfer & Trust, following two separate cyber intrusions that resulted in the loss of $6.6 million in client funds. Equiniti has agreed to pay $850,000 to settle charges that it failed to implement sufficient cybersecurity measures to protect its clients' assets.

article thumbnail

GDPR Data Breach Notification Letter (Free Download)

Tech Republic Security

In the current business environment, it is almost inevitable that an organization will experience a security breach that exposes collected personal data to unauthorized access. Under the provisions of the General Data Protection Regulation, regardless of the severity of the security breach, organizations must inform their EU customers and stakeholders of the incident in a.

article thumbnail

Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem

Trend Micro

We provide a technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

article thumbnail

Cyberattack Disrupts Operations at Seattle-Tacoma Airport

ZoneAlarm

In an alarming escalation of cyber threats targeting critical infrastructure, Seattle-Tacoma International Airport (SEA) recently fell victim to a cyberattack that caused widespread disruptions. The incident, which occurred over the weekend, led to significant delays, triggering a swift response from airport authorities and cybersecurity experts. As airports become increasingly digitized, this attack underscores the vulnerability … The post Cyberattack Disrupts Operations at Seattle-Tacoma

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.