Wed.Oct 11, 2023

article thumbnail

Cisco Can’t Stop Using Hard-Coded Passwords

Schneier on Security

There’s a new Cisco vulnerability in its Emergency Responder product: This vulnerability is due to the presence of static user credentials for the root account that are typically reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Passwords 357
article thumbnail

New DDoS Attack is Record Breaking: HTTP/2 Rapid Reset Zero-Day Reported by Google, AWS & Cloudflare

Tech Republic Security

A vulnerability in the HTTP/2 network protocol is currently being exploited, resulting in the largest DDoS attack in history. Find out what security teams should do now, and hear what Cloudflare's CEO has to say about this DDoS.

DDOS 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Defender now auto-isolates compromised accounts

Bleeping Computer

Microsoft Defender for Endpoint now uses automatic attack disruption to isolate compromised user accounts and block lateral movement in hands-on-keyboard attacks with the help of a new 'contain user' capability in public preview. [.

article thumbnail

F5 Warns Australian IT of Social Engineering Risk Escalation Due to Generative AI

Tech Republic Security

F5 says an artificial intelligence war could start between generative AI-toting bad actors and enterprises guarding data with AI. Australian IT teams will be caught in the crossfire.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA adds Adobe Acrobat Reader flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the flaw CVE-2023-21608 in Adobe Acrobat Reader to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added five new flaws to its Known Exploited Vulnerabilities Catalog , including a high-severity flaw ( CVE-2023-21608 ) (CVSS score: 7.8) in Adobe Acrobat Reader. The flaw is a use-after-free issue, an attacker can trigger the flaw to achieve remote code execution (RCE) with the privileges of the current user. “Ado

VPN 140
article thumbnail

How to Mount Remote Directories with SSH (+Video Tutorial)

Tech Republic Security

Learn how to easily mount remote directories with the help of a more secure SSH tool. Follow along with Jack Wallen in our step-by-step tutorial.

157
157

More Trending

article thumbnail

6 steps to getting the board on board with your cybersecurity program

We Live Security

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

CISO 135
article thumbnail

Microsoft Patch Tuesday updates for October 2023 fixed three actively exploited zero-day flaws

Security Affairs

Microsoft Patch Tuesday security updates for October 2023 fixed three actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for October 2023 addressed a total of 103 vulnerabilities in Microsoft Windows and Windows Components; Exchange Server; Office and Office Components; ASP.NET Core and Visual Studio; Azure; Microsoft Dynamics; and Skype for Business.

Hacking 136
article thumbnail

Two High-Risk Security Flaws Discovered in Curl Library - New Patches Released

The Hacker News

Patches have been released for two security flaws impacting the Curl data transfer library, the most severe of which could potentially result in code execution. The list of vulnerabilities is as follows - CVE-2023-38545 (CVSS score: 7.5) - SOCKS5 heap-based buffer overflow vulnerability CVE-2023-38546 (CVSS score: 5.

Risk 135
article thumbnail

New WordPress backdoor creates rogue admin to hijack websites

Bleeping Computer

A new malware has been posing as a legitimate caching plugin to target WordPress sites, allowing threat actors to create an administrator account and control the site's activity. [.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits

The Hacker News

Microsoft has released its Patch Tuesday updates for October 2023, addressing a total of 103 flaws in its software, two of which have come under active exploitation in the wild. Of the 103 flaws, 13 are rated Critical and 90 are rated Important in severity. This is apart from 18 security vulnerabilities addressed in its Chromium-based Edge browser since the second Tuesday of September.

Software 133
article thumbnail

Air Europa data breach exposed customers’ credit cards

Security Affairs

Airline Air Europa disclosed a data breach and warned customers to cancel their credit cards after threat actors accessed their card information. Air Europa is a Spanish airline and a subsidiary of the Globalia Corporation. It operates as a full-service carrier, providing passenger and cargo services to various destinations, both domestic and international.

article thumbnail

DarkGate Opens Organizations for Attack via Skype, Teams

Trend Micro

We detail an ongoing campaign abusing messaging platforms Skype and Teams to distribute the DarkGate malware to targeted organizations. We also discovered that once DarkGate is installed on the victim’s system, additional payloads were introduced to the environment.

Malware 130
article thumbnail

CISA Warns of Actively Exploited Adobe Acrobat Reader Vulnerability

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-21608 (CVSS score: 7.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Windows 11 21H2 and Windows Server 2012 reach end of support

Bleeping Computer

Windows Server 2012 and multiple editions of Windows 11, version 21H2, have reached the end of support with this month's Patch Tuesday.

124
124
article thumbnail

Over 17,000 WordPress Sites Compromised by Balada Injector in September 2023

The Hacker News

More than 17,000 WordPress websites have been compromised in the month of September 2023 with malware known as Balada Injector, nearly twice the number of detections in August. Of these, 9,000 of the websites are said to have been infiltrated using a recently disclosed security flaw in the tagDiv Composer plugin (CVE-2023-3169, CVSS score: 6.

Malware 127
article thumbnail

Post-Quantum Computing and Your Certificate Authority: Navigating a Secure Digital Future

GlobalSign

Let’s take a look at the implications of Post-Quantum Computing and why your certificates remain reliable safeguards of your digital assets.

122
122
article thumbnail

Unlock 2023’s Best Practices: How to Implement the NIST Cybersecurity Framework

Security Boulevard

Introduction Welcome to 2023, a year that promises to be pivotal in the realm of cybersecurity. As we navigate an increasingly digital world, the need for robust cybersecurity frameworks has never been more urgent. One such framework that stands out is the NIST Cybersecurity Framework, a comprehensive guide designed to help organizations manage and mitigate … Unlock 2023’s Best Practices: How to Implement the NIST Cybersecurity Framework Read More » The post Unlock 2023’s Best Practices: How to

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Mount Remote Directories with SSH

Tech Republic Security

Learn how to easily mount remote directories with the help of a more secure SSH tool. Follow along with Jack Wallen in our step-by-step tutorial.

122
122
article thumbnail

Exchange Online mail delivery issues caused by anti-spam rules

Bleeping Computer

Microsoft is investigating Exchange Online mail delivery issues causing "Server busy" errors and delays when receiving emails from outside organizations. [.

120
120
article thumbnail

Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords

The Hacker News

Passwords are at the core of securing access to an organization's data. However, they also come with security vulnerabilities that stem from their inconvenience. With a growing list of credentials to keep track of, the average end-user can default to shortcuts.

Passwords 119
article thumbnail

Reassessing the Impacts of Risk Management With NIST Framework 2.0

Dark Reading

The latest NIST Cybersecurity Framework draft highlights four major themes that organizations should pay attention to for managing risk.

Risk 119
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Ransomware review: October 2023

Malwarebytes

This article is based on research by Marcelo Rivero, Malwarebytes' ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, "known attacks" are those where the victim did not pay a ransom. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.

article thumbnail

Microsoft: Chinese APT Behind Atlassian Confluence Attacks; PoCs Appear

Dark Reading

Organizations should brace for mass exploitation of CVE-2023-22515, an uber-critical security bug that opens the door to crippling supply chain attacks on downstream victims.

116
116
article thumbnail

How to Use the Scp Command to Securely Send a File from Your Desktop to a Server

Tech Republic Security

Learn how to use the scp command to transfer files securely with this step-by-step video tutorial by Jack Wallen.

article thumbnail

News alert: Study finds law firms targeted — ALSO Cloud UK urges them to shore up cyber hygiene

The Last Watchdog

Emmen, Switzerland, Oct. 11, 2023 — Recent research by the National Cyber Security Centre (NCSC) has found UK law firms are increasingly appealing targets for cybercriminals interested in stealing and exploiting client data. Hybrid working has been cited as a challenge for firms attempting to maintain secure working practices and protect client confidentiality, but as cyberattacks become more sophisticated, the data that law firms hold are targeted for ransomware and insider trading.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

High-Stakes Identity Impersonation: Lessons From the MGM Attack

Security Boulevard

MGM Resorts recently found itself in the midst of a major cybersecurity incident that not only crippled its operations but also exposed sensitive customer data. The sophisticated attack orchestrated by a group known as Scattered Spider employed social engineering to the IT department to reset credentials. The attackers then gained access to the SSO, raised their identity credentials to super user level and then systematically got into other systems.

article thumbnail

Adobe Acrobat Reader Vuln Now Under Attack

Dark Reading

CISA flags use-after-free bug now being exploited in the wild.

110
110
article thumbnail

Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants

The Hacker News

High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that's designed to deploy basic backdoors and loaders for delivering next-stage malware. Cybersecurity company Check Point is tracking the activity under the name Stayin' Alive. Targets include organizations located in Vietnam, Uzbekistan, Pakistan, and Kazakhstan.

article thumbnail

Curl Bug Hype Fizzles After Patching Reveal

Dark Reading

Touted for days as potentially catastrophic, the curl flaws only impact a narrow set of deployments.

109
109
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.