Fri.Dec 01, 2023

article thumbnail

AI Decides to Engage in Insider Trading

Schneier on Security

A stock-trading AI (a simulated experiment) engaged in insider trading, even though it “knew” it was wrong. The agent is put under pressure in three ways. First, it receives a email from its “manager” that the company is not doing well and needs better performance in the next quarter. Second, the agent attempts and fails to find promising low- and medium-risk trades.

Marketing 312
article thumbnail

Apple Security Update Fixes Zero-Day Webkit Exploits

Tech Republic Security

Apple recommends users update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Google’s Threat Analysis Group discovered these security bugs.

Software 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Anton on Security

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. In this blog (#6 in the series), we will covers some DOs and DON’Ts regarding TI/CTI and DE interaction and continue building the TI -> DE process machinery Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Detection Engineering and SOC Scalability Challenges (Part 2) Build for Detection Engineering, and Alerting Will Improve (Part 3) Focu

article thumbnail

Make Life Safer and Easier With This Password Manager for Just $15

Tech Republic Security

Store unlimited passwords in unlimited vaults on multiple servers, customize fields, use the tool on your smart watch, enjoy built-in authenticator and much more.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Expert warns of Turtle macOS ransomware

Security Affairs

The popular cybersecurity researcher Patrick Wardle dissected the new macOS ransomware Turtle used to target Apple devices. The popular cyber security researcher Patrick Wardle published a detailed analysis of the new macOS ransomware Turtle. Wardle pointed out that since Turtle was uploaded on Virus Total, it was labeled as malicious by 24 anti-malware solutions, suggesting it is not a sophisticated threat.

article thumbnail

Security Pros See Budget Bump, Headcount Rise in 2023

Security Boulevard

Increased budgets and team sizes within security departments are giving IT pros a boost despite the prevailing economic challenges in 2023. The post Security Pros See Budget Bump, Headcount Rise in 2023 appeared first on Security Boulevard.

Risk 128

More Trending

article thumbnail

TikTok Ban Banned — Montana Loses in US Court

Security Boulevard

For you plague, still: States can’t just ban apps, says federal judge. The post TikTok Ban Banned — Montana Loses in US Court appeared first on Security Boulevard.

article thumbnail

Windows 10 KB5032278 update adds Copilot AI assistant, fixes 13 bugs

Bleeping Computer

Microsoft has started rolling out its Copilot AI assistant to Windows 10 with the KB5032278 November 2023 non-security preview update for systems running Windows 10, version 22H2. [.

110
110
article thumbnail

Iranian Hackers Target U.S. Water Facility

SecureWorld News

In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) responded to an active cyberattack on a water facility in western Pennsylvania, shedding light on the exploitation of Unitronics programmable logic controllers (PLCs) within the Water and Wastewater Systems (WWS) sector. The targeted facility, identified as the Municipal Water Authority of Aliquippa, fell victim to a cyberattack where threat actors successfully exploited Unitronics PLCs.

article thumbnail

Hackers use new Agent Raccoon malware to backdoor US targets

Bleeping Computer

A novel malware named 'Agent Raccoon' (or Agent Racoon) is being used in cyberattacks against organizations in the United States, the Middle East, and Africa. [.

Malware 112
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added ownCloud and Google Chrome vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added ownCloud and Google Chrome vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The two issues are: CVE-2023-6345 Google Skia Integer Overflow Vulnerability CVE-2023-49103 ownCloud graphapi Information Disclosure Vulnerability CVE-2023-6345 – The CVE-2023-5217 is a high-severity integer overflow

article thumbnail

CompTIA PenTest+ vs. CEH: Which is the Best Fit for You?

CompTIA on Cybersecurity

We are often asked, “How does CompTIA PenTest+ compare to CEH?” To help you choose which exam to take, here’s a brief overview of the two cybersecurity certifications plus five advantages of CompTIA PenTest+ over CEH.

article thumbnail

TrickBot malware dev pleads guilty, faces 35 years in prison

Bleeping Computer

On Thursday, a Russian national pleaded guilty to charges related to his involvement in developing and deploying the Trickbot malware, which was used in attacks against hospitals, companies, and individuals in the United States and worldwide. [.

Malware 100
article thumbnail

Digital Signing Offers Greater Protection Against the Growing AI Threat

GlobalSign

In this blog we examine how businesses can use digital signing to protect themselves against the growing threat of AI attacks.

119
119
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

French government recommends against using foreign chat apps

Bleeping Computer

Prime Minister of France Élisabeth Borne signed a circular last week requesting all government employees to uninstall foreign communication apps such as Signal, WhatsApp, and Telegram by December 8, 2023, in favor of a French messaging app named 'Olvid.' [.

article thumbnail

IT threat evolution in Q3 2023. Mobile statistics

SecureList

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2023: A total of 8,346,169 mobile malware, adware, and riskware attacks were blocked. The most common threat to mobile devices was adware, accounting for 52% of all detected threats. 438,962 malicious installation packages were detected, of which: 21,674 packages were related to mobile banking Troj

Mobile 95
article thumbnail

VMware fixes critical Cloud Director auth bypass unpatched for 2 weeks

Bleeping Computer

VMware has fixed a critical authentication bypass vulnerability in Cloud Director appliance deployments, a bug that was left unpatched for over two weeks since it was disclosed on November 14th. [.

article thumbnail

Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware

The Hacker News

A Russian national has been found guilty in connection with his role in developing and deploying a malware known as TrickBot, the U.S. Department of Justice (DoJ) announced. Vladimir Dunaev, 40, was arrested in South Korea in September 2021 and extradited to the U.S. a month later.

Malware 100
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Explained: Domain fronting

Malwarebytes

Domain fronting is a technique of using different domain names on the same HTTPS connection. Put simply, domain fronting hides your traffic when connecting to a specific website. It routes traffic through a larger platform, masking the true destination in the process. The technique became popular in the early 2010s in the mobile app development ecosystem, where developers would configure their apps to connect to a “front” domain that would then forward the connections to the develope

DNS 87
article thumbnail

New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia

The Hacker News

Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like Indonesia, Thailand, and Vietnam since early September 2023.

Banking 99
article thumbnail

The Week in Ransomware - December 1st 2023 - Police hits affiliates

Bleeping Computer

An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. [.

article thumbnail

Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan

The Hacker News

A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign Affairs and South Korean users with a remote access trojan called SugarGh0st RAT.

Malware 90
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Advanced Cyber Espionage: SugarGh0st RAT Attacks Uzbek and South Korean Entities

Penetration Testing

In the realm of cyber warfare, a new player has emerged, codenamed SugarGh0st. This Remote Access Trojan (RAT) has recently been identified by Cisco Talos as targeting government institutions in Uzbekistan and entities in... The post Advanced Cyber Espionage: SugarGh0st RAT Attacks Uzbek and South Korean Entities appeared first on Penetration Testing.

article thumbnail

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats

The Hacker News

The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in disrupting this long-running threat, concerns have arisen as it appears that Qakbot may still pose a danger in a reduced form.

Malware 84
article thumbnail

A New Set of Tools for Cyber Espionage: Targeting the Middle East, Africa, and the US

Penetration Testing

In a groundbreaking discovery, researchers from Unit 42 at Palo Alto Networks have uncovered a new toolset being used in cyber attacks against organizations in the Middle East, Africa, and the United States. This... The post A New Set of Tools for Cyber Espionage: Targeting the Middle East, Africa, and the US appeared first on Penetration Testing.

article thumbnail

Stressed Employees and Insider Threats Put Data in Danger

Security Boulevard

The majority of data breaches involved the human element, a catchall term for company insiders who compromise company and customer data. The post Stressed Employees and Insider Threats Put Data in Danger appeared first on Security Boulevard.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Exposed: Hidden Risks in Google Workspace’s Domain Delegation

Penetration Testing

In the ever-evolving realm of cloud computing, a critical risk has surfaced within Google Workspace’s Domain-Wide Delegation feature, as revealed by Unit 42 researchers at Palo Alto Networks. This discovery sheds light on the... The post Exposed: Hidden Risks in Google Workspace’s Domain Delegation appeared first on Penetration Testing.

Risk 86
article thumbnail

Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks

The Hacker News

The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS attacks across multiple industries. At the beginning of 2023, the average strength of attacks reached 800 Gbps, but now, even a peak as high as 1.5+ Tbps is unsurprising. To try and break through Gcore’s defenses, perpetrators made two attempts with two different strategies.

DDOS 81
article thumbnail

APT29 Lures Victims with Fake BMW Ads in Latest Attack

Penetration Testing

The hacking collective APT29, also known as Cozy Bear and Midnight Blizzard, recently orchestrated a malicious campaign employing counterfeit BMW advertisements, the Ngrok tool, and exploiting a vulnerability in the WinRAR archiver, known as... The post APT29 Lures Victims with Fake BMW Ads in Latest Attack appeared first on Penetration Testing.

article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Security Boulevard

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. In this blog (#6 in the series), we will covers some DOs and DON’Ts regarding TI/CTI and DE interaction and continue building the TI -> DE process machinery Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Detection Engineering and SOC Scalability Challenges (Part 2) Build for Detection Engineering, and Alerting Will Improve (Part 3) Focu

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.