Wed.Oct 23, 2024

article thumbnail

News alert: INE Security shares cyber hygiene guidance for small- and medium-sized businesses

The Last Watchdog

Cary, NC, Oct. 22, 2024, CyberNewswire — INE Security offers essential advice to protect digital assets and enhance security. As small businesses increasingly depend on digital technologies to operate and grow, the risks associated with cyber threats also escalate. INE Security , a leading provider of cybersecurity training and certifications, today shared its cybersecurity training for cyber hygiene practices for small businesses, underscoring the critical role of continuous education in

article thumbnail

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Tech Republic Security

It only takes five days on average for attackers to exploit a vulnerability, according to a new report by cybersecurity company Mandiant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fortinet Warns of Actively Exploited Flaw in FortiManager: CVE-2024-47575 (CVSS 9.8)

Penetration Testing

Fortinet has issued a security advisory for its FortiManager platform, addressing a critical vulnerability—CVE-2024-47575—which has been actively exploited in the wild. This vulnerability, rated at CVSS 9.8, arises from a... The post Fortinet Warns of Actively Exploited Flaw in FortiManager: CVE-2024-47575 (CVSS 9.8) appeared first on Cybersecurity News.

article thumbnail

The Crypto Game of Lazarus APT: Investors vs. Zero-days

SecureList

Introduction Lazarus APT and its BlueNoroff subgroup are a highly sophisticated and multifaceted Korean-speaking threat actor. We closely monitor their activities and quite often see them using their signature malware in their attacks — a full-feature backdoor called Manuscrypt. According to our research, Lazarus has been employing this malware since at least 2013 and we’ve documented its usage in 50+ unique campaigns targeting governments, diplomatic entities, financial institutions, mili

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

U.S. CISA adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft SharePoint flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft SharePoint Deserialization Vulnerability CVE-2024-38094 (CVSS v4 score: 7.2) to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions

WIRED Threat Level

Russia, Iran, and China are targeting the US election with an evolving array of influence operations in the last days of campaign season.

144
144

More Trending

article thumbnail

Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

The Hacker News

Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE-2024-47575 (CVSS score: 9.8), the vulnerability is also known as FortiJump and is rooted in the FortiGate to FortiManager (FGFM) protocol.

article thumbnail

Why DSPM is Essential for Achieving Data Privacy in 2024

Security Affairs

Data Security Posture Management (DSPM) helps organizations address evolving data security and privacy requirements by protecting and managing sensitive information. Data Security Posture Management (DSPM) comes into play– an essential solution for addressing evolving data security and privacy requirements Data plays a significant role and will continue to do so in the future.

article thumbnail

CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

The Hacker News

A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-38094 (CVSS score: 7.

article thumbnail

SEC fined 4 companies for misleading disclosures about the impact of the SolarWinds attack

Security Affairs

The SEC fined Unisys, Avaya, Check Point, and Mimecast for misleading disclosures about the impact of the SolarWinds Orion hack. The US Securities and Exchange Commission (SEC) charged four companies, Unisys, Avaya, Check Point, and Mimecast for misleading public disclosures related to the supply chain attack on SolarWinds. The SEC fined the four companies for having downplayed the impact of the attack.

Hacking 122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Embargo ransomware: Rock’n’Rust

We Live Security

ESET researchers uncover new Rust-based tools that we named MDeployer and MS4Killer and that are actively utilized by a new ransomware group called Embargo.

article thumbnail

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

The Hacker News

New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that the malicious software is continuing to be actively developed despite law enforcement efforts to crack down on the operation.

Banking 137
article thumbnail

LinkedIn bots and spear phishers target job seekers

Malwarebytes

Microsoft’s social network for professionals, LinkedIn, is an important platform for job recruiters and seekers alike. It’s also a place where criminals go to find new potential victims. Like other social media platforms, LinkedIn is no stranger to bots attracted to special keywords and hashtags. Think “I was laid off”, “I’m #opentowork” and similar phrases that can wake up a swarm of bots hungry to scam someone new.

Phishing 134
article thumbnail

Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models

The Hacker News

Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Crooks are targeting Docker API servers to deploy SRBMiner

Security Affairs

Threat actors are targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances, Trend Micro warns. Trend Micro researchers observed attackers targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances. The threat actors used the gRPC protocol over h2c to bypass security and execute crypto mining on Docker hosts, manipulating Docker functionalities via gRPC methods. “The attacker first checked the availability and version o

article thumbnail

Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks

The Hacker News

Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. "Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware," Trend Micro researchers Jaromir Horejsi and Nitesh Surana said.

article thumbnail

Chrome Patches Multi Vulnerabilities in Latest Stable Release

Penetration Testing

Google has rolled out a crucial update to its Chrome browser, addressing three high-severity security flaws that could be exploited by attackers. The update, versions 130.0.6723.69/.70 for Windows and Mac,... The post Chrome Patches Multi Vulnerabilities in Latest Stable Release appeared first on Cybersecurity News.

article thumbnail

Nigeria Drops Charges Against Tigran Gambaryan, Jailed Binance Exec and Former IRS Agent

WIRED Threat Level

After eight months, one of the US's most prominent crypto-crime investigators may finally be coming home.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

After concerns of handing Facebook taxpayer info, four companies found to have improperly shared data

Malwarebytes

Four tax preparation software companies failed to comply with government rules that require the sharing of tax-related info to be done only with specific disclosures and full tax-payer consent, according to an audit released by the Treasure Inspector General for Tax Administration (TIGTA) in the United States. “According to Treasury Regulation § 301.7216-3, tax return information may not be used or disclosed except as specifically permitted or when the taxpayer provides consent.

article thumbnail

IBM Addresses AI, Quantum Security Risks with New Platform

Security Boulevard

IBM is rolling out Guardian Data Security Center, a framework designed to give enterprises the tools they need to address the emerging cyberthreats that come the ongoing development of generative AI and quantum computing. The post IBM Addresses AI, Quantum Security Risks with New Platform appeared first on Security Boulevard.

Risk 114
article thumbnail

Raspberry Pi just released its own high-performance SSDs and SSD kits

Zero Day

Here's the perfect way to add high-performance storage to your Raspberry Pi 5 project.

122
122
article thumbnail

SEC Fines Four Companies $7M for Misleading Cybersecurity Disclosures

SecureWorld News

The U.S. Securities and Exchange Commission (SEC) announced Tuesday that it has fined four companies $7 million for misleading statements about their cybersecurity incidents, particularly concerning the high-profile 2019 SolarWinds hack. Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd., and Mimecast Limited were found to have downplayed the severity of their data breaches in public disclosures, obscuring the full scope of the incidents from investors and the public.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Scattered Spider x RansomHub: A New Partnership

Digital Shadows

Editor’s note: James Xiang and Hayden Evans contributed to this blog. Key Points In October 2024, ReliaQuest responded to an intrusion affecting a manufacturing sector customer. We identified “Scattered Spider” to be behind the incident. This English-speaking collective previously served as an affiliate for ransomware group “ALPHV” and now partners with “RansomHub.

article thumbnail

Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

The Hacker News

Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake to name a few. Organizations are starting to realize that a shake-up is needed in terms of the way we approach identity security both from a strategic but also a technology vantage point.

article thumbnail

FortiJump: Yet Another Critical Fortinet 0-Day RCE

Security Boulevard

FortiFAIL: Remote code execution vulnerability still not acknowledged by Fortinet after 10+  days’ exploitation. The post FortiJump: Yet Another Critical Fortinet 0-Day RCE appeared first on Security Boulevard.

article thumbnail

New WarmCookie/BadSpace Malware Targets Organizations

Penetration Testing

Cisco Talos researchers uncovered a new and highly adaptive malware family, WarmCookie, also referred to as BadSpace. This malware has been actively used since April 2024, targeting organizations across various... The post New WarmCookie/BadSpace Malware Targets Organizations appeared first on Cybersecurity News.

Malware 117
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

The Hacker News

It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no wonder—the recent AppOmni 2024 State of SaaS Security Report reveals that only 15% of organizations centralize SaaS security within their cybersecurity teams.

Risk 115
article thumbnail

AI is Revolutionizing Cybersecurity — But Not in the Ways You Might Think  

Security Boulevard

The cybersecurity revolution that began with increased network visibility has culminated in the rise of AI, which can automatically make sense of information that even the best-staffed IT departments never could. The post AI is Revolutionizing Cybersecurity — But Not in the Ways You Might Think appeared first on Security Boulevard.

article thumbnail

Running out of Gmail storage? How to get another 15GB for free (and not lose anything)

Zero Day

Whether you're a digital hoarder or separating from a work or school account, you can archive your Google messages and media with this free and clever workaround.

Media 105
article thumbnail

Bolstering CTEM with AI and Purple Team Security

Security Boulevard

Together, AI and purple security offer ideal actionable input and ongoing orientation for a CTEM framework. The post Bolstering CTEM with AI and Purple Team Security appeared first on Security Boulevard.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.