Sun.Nov 17, 2024

article thumbnail

SafePay Ransomware: A New Threat with Sophisticated Techniques

Penetration Testing

In October 2024, Huntress analysts uncovered a previously unreported ransomware strain, dubbed SafePay, deployed across two distinct incidents. This ransomware has unique characteristics, including the use of.safepay as the... The post SafePay Ransomware: A New Threat with Sophisticated Techniques appeared first on Cybersecurity News.

article thumbnail

Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

The Hacker News

A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin for WordPress that, if successfully exploited, could grant an attacker to remotely gain full administrative access to a susceptible site. The vulnerability, tracked as CVE-2024-10924 (CVSS score: 9.8), impacts both free and premium versions of the plugin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PostgreSQL Releases Security Update Addressing Multiple Vulnerabilities

Penetration Testing

The PostgreSQL Global Development Group has issued an important update addressing four security vulnerabilities across all supported versions of the popular open-source database system. This includes versions 17.1, 16.5, 15.9,... The post PostgreSQL Releases Security Update Addressing Multiple Vulnerabilities appeared first on Cybersecurity News.

article thumbnail

NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit

The Hacker News

Legal documents released as part of an ongoing legal tussle between Meta's WhatsApp and NSO Group have revealed that the Israeli spyware vendor used multiple exploits targeting the messaging app to deliver Pegasus, including one even after it was sued by Meta for doing so.

Spyware 120
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What Is The Content Delivery & Security Association (CDSA)?

Security Boulevard

The Content Delivery & Security Association (CDSA) has long been a cornerstone in the media and entertainment industries. It ensures that the highest content security and delivery standards are met. As the digital landscape continues to evolve, the role of the CDSA has become more critical than ever. It addresses new challenges and provides innovative […] The post What Is The Content Delivery & Security Association (CDSA)?

Media 104
article thumbnail

I recommend this $60 anti-spy camera finder and bug detector to anyone traveling (get 38% off in this Back Froday deal!)

Zero Day

Social media is awash with ads for gadgets that detect hidden cameras and bugs in your hotel room, Airbnb, or even your own home. So I tested one to see if it actually works.

Media 98

More Trending

article thumbnail

Reducing the Crushing Burden of Cybersecurity, Privacy Laws in the UK

SecureWorld News

The UK has a complex regulatory landscape for businesses, particularly in the realms of cybersecurity and privacy. The interplay of domestic and international regulations presents significant challenges for organizations, demanding significant investments in technology, personnel, and processes. This challenge is especially prevalent for UK small and medium-sized enterprises (SMEs) which account for 99.9% of the UK's business population, 5.5 million businesses.

article thumbnail

PoC Exploit Releases for Zero-Day CVE-2024-47575 Flaw in Fortinet FortiManager

Penetration Testing

Security researcher Sina Kheirkhah from watchTowr recently published technical details and a proof-of-concept (PoC) exploit for a critical zero-day vulnerability, dubbed “FortiJump” (CVE-2024-47575). With a CVSS score of 9.8, this... The post PoC Exploit Releases for Zero-Day CVE-2024-47575 Flaw in Fortinet FortiManager appeared first on Cybersecurity News.

article thumbnail

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

Trend Micro

In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques.

IoT 74
article thumbnail

Critical Really Simple Security plugin flaw impacts 4M+ WordPress sites

Security Affairs

A Really Simple Security plugin flaw affects 4M+ sites, allowing attackers full admin access. It’s one of the most critical WordPress vulnerabilities ever. Wordfence researchers warn of a vulnerability, tracked as CVE-2024-10924 (CVSS Score of 9.8), in the Really Simple Security plugin that affects 4M+ sites. The Really Simple Security plugin, formerly Really Simple SSL, is a popular WordPress tool that enhances website security with features like login protection, vulnerability detection, and t

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

This 'lifelike' AI granny is infuriating phone scammers. Here's how - and why

Zero Day

If you're tired of dealing with scammers, take heart in knowing that this AI grandma is fighting back.

105
105
article thumbnail

Introducing Shadow Dumper: A Powerful Tool for LSASS Memory Extraction

Penetration Testing

In the world of cybersecurity, penetration testers and red teams need sophisticated tools to assess and improve an organization’s security posture. One such tool gaining traction is Shadow Dumper, an... The post Introducing Shadow Dumper: A Powerful Tool for LSASS Memory Extraction appeared first on Cybersecurity News.

article thumbnail

This thermal camera is my new favorite smartphone accessory (and it's $50 off)

Zero Day

Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user's toolkit.

89
article thumbnail

CVE-2024-10217 & CVE-2024-10218: TIBCO Hawk Faces Critical Security Risks

Penetration Testing

TIBCO, a prominent provider of enterprise integration and management software, has issued urgent security advisories addressing two critical vulnerabilities affecting its Operational Intelligence Hawk platform. These flaws, identified as CVE-2024-10217... The post CVE-2024-10217 & CVE-2024-10218: TIBCO Hawk Faces Critical Security Risks appeared first on Cybersecurity News.

Risk 65
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

I recommend this $60 anti-spy camera finder to anyone traveling (and it's 38% off for Black Friday)

Zero Day

Social media is awash with ads for gadgets that detect hidden cameras and bugs in your hotel room, Airbnb, or even your own home. So I tested one to see if it actually works.

Media 75
article thumbnail

Critical Vulnerabilities in Citrix Virtual Apps and Desktops Actively Exploited

Penetration Testing

Two vulnerabilities in Citrix’s “Virtual Apps and Desktops” remote access solution, CVE-2024-8068 and CVE-2024-8069, are actively being exploited in the wild, according to a report from Johannes B. Ullrich, Ph.D.,... The post Critical Vulnerabilities in Citrix Virtual Apps and Desktops Actively Exploited appeared first on Cybersecurity News.

article thumbnail

Buy a Microsoft Office 2019 license for Mac or Windows for $27

Zero Day

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 88% off.

105
105
article thumbnail

Chinese Threat Actor SilkSpecter Exploits Black Friday Frenzy with Sophisticated Phishing Campaign

Penetration Testing

In a detailed report released by the EclecticIQ Threat Research Team, cybersecurity analysts have uncovered a well-coordinated phishing campaign targeting e-commerce shoppers in the United States and Europe during the... The post Chinese Threat Actor SilkSpecter Exploits Black Friday Frenzy with Sophisticated Phishing Campaign appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Join Costco and get a $20 gift card with your membership right now

Zero Day

Don't miss this deal to buy your own Costco membership and get a $20 gift card, effectively cutting the price to $45 for the year. (I bought one and highly recommend it.

98
article thumbnail

Why It’s Time to Leave Twitter

Security Boulevard

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and delete tweets, and evaluates alternative platforms such as Bluesky, Mastodon, and Threads for cybersecurity professionals seeking […] The post Why It’s Time to Leave Twitter appeared first on Shared Security Podcast.

article thumbnail

Upgrade to Windows 11 Pro for $18 - the lowest price this year

Zero Day

Save 90% on a Windows 11 Pro license with this deal for more productivity features to help you get things done.

111
111
article thumbnail

Connecting, Collaborating, and Celebrating: Our Global Team Seminar in the South of France

Security Boulevard

Last September, GitGuardian brought together its 150 Guardians from around the world for a three-day seminar on the beautiful Giens Peninsula in the south of France. The post Connecting, Collaborating, and Celebrating: Our Global Team Seminar in the South of France appeared first on Security Boulevard.

59
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Sonatype Nexus Repository 2 Hit By RCE (CVE-2024-5082) and XSS (CVE-2024-5083) Flaws

Penetration Testing

Sonatype has issued two security advisories for its Nexus Repository Manager 2.x, a popular repository manager used by organizations worldwide to store and distribute software artifacts, warning users of two... The post Sonatype Nexus Repository 2 Hit By RCE (CVE-2024-5082) and XSS (CVE-2024-5083) Flaws appeared first on Cybersecurity News.

article thumbnail

DEF CON 32 – Process Injection Attacks With ROP

Security Boulevard

Authors/Presenters: Bramwell Brizendine, Shiva Shashank Kusuma Our sincere appreciation to DEF CON , and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Process Injection Attacks With ROP appeared first on Security Boulevard.

article thumbnail

This is the smartest electronic precision screwdriver I've ever tested (and now get 10% off for Black Friday)

Zero Day

The Arrowmax SES Max can sense the direction and torque needed to tighten a screw and even connects to an app.

81
article thumbnail

5 Tips for Avoiding Charity Scams Over the Holidays

Identity IQ

5 Tips for Avoiding Charity Scams Over the Holidays IdentityIQ For many charities, the holiday season is the biggest time of the year for charitable donations. People are in a giving mood, the deadline for making this year’s tax-deductible donations is approaching, and mission-based organizations are making their final push to solicit donors. But this spike in giving can put donors at risk of fraud, identity theft, and other scams.

Scams 52
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Analyzing JtR’s Tokenizer Attack (Round 1)

Security Boulevard

Introduction / Goals / Scope: This is a follow-up to my previous blog post looking at how to install/run the new John the Ripper Tokenizer attack [ Link ]. The focus of this post will be on performing a first pass analysis about how the Tokenizer attack actually performs. Before I dive into the tests, I want to take a moment to describe the goals of this testing.

article thumbnail

What Is The Content Delivery & Security Association (CDSA)?

Centraleyes

The Content Delivery & Security Association (CDSA) has long been a cornerstone in the media and entertainment industries. It ensures that the highest content security and delivery standards are met. As the digital landscape continues to evolve, the role of the CDSA has become more critical than ever. It addresses new challenges and provides innovative solutions to protect valuable content from piracy, unauthorized access, and other security threats.

Media 52
article thumbnail

Apache Traffic Server Patches Critical Vulnerabilities in Latest Release

Penetration Testing

The Apache Software Foundation has released a security update for Apache Traffic Server, addressing three critical vulnerabilities that could leave users susceptible to a range of cyberattacks. The flaws, impacting... The post Apache Traffic Server Patches Critical Vulnerabilities in Latest Release appeared first on Cybersecurity News.

article thumbnail

One of the most reliable power banks I've tested can even inflate car tires (and get 50% off in this Black Friday deal)

Zero Day

Anything from car tires to beach balls is no match for the AstroAI L4.

Banking 81
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.