Mon.Apr 01, 2024

article thumbnail

Magic Security Dust

Schneier on Security

Adam Shostack is selling magic security dust. It’s about time someone is commercializing this essential technology.

article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

The technology and best practices for treating cybersecurity as a business enabler, instead of an onerous cost-center, have long been readily available. Related: Data privacy vs data security However, this remains a novel concept at most companies. Now comes a Forrester Research report that vividly highlights why attaining and sustaining a robust cybersecurity posture translates into a competitive edge.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Arjun: HTTP parameter discovery suite

Penetration Testing

Arjun Arjun can find query parameters for URL endpoints. If you don’t get what that means, it’s okay, read along. Web applications use parameters (or queries) to accept user input, consider the following example... The post Arjun: HTTP parameter discovery suite appeared first on Penetration Testing.

article thumbnail

Free VPN apps turn Android phones into criminal proxies

Malwarebytes

Researchers at HUMAN’s Satori Threat Intelligence have discovered a disturbing number of VPN apps that turn users’ devices into proxies for cybercriminals without their knowledge, as part of a camapign called PROXYLIB. Cybercriminals and state actors like to send their traffic through other people’s devices, known as proxies. This allows them to use somebody else’s resources to get their work done, it masks the origin of their attacks so they are less likely to get blocked, and it ma

VPN 144
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs

Trend Micro

This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON.

Malware 143
article thumbnail

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

The Hacker News

Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user's device into a proxy node without their knowledge.

VPN 143

LifeWorks

More Trending

article thumbnail

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

The Hacker News

The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT.

Phishing 142
article thumbnail

Info stealer attacks target macOS users

Security Affairs

Experts warn of info stealer malware, including Atomic Stealer, targeting Apple macOS users via malicious ads and rogue websites. Jamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. One of the attacks spotted by the researchers relied on sponsored ads proposed to the users while searching for “Arc Browser” on Google.

Malware 142
article thumbnail

CVE-2024-29201 & CVE-2024-29202 Flaws Expose JumpServer Users to RCE Attacks

Penetration Testing

JumpServer, a popular open-source bastion host system, has recently been found to contain two critical vulnerabilities (CVE-2024-29201 and CVE-2024-29202) that could allow attackers to execute arbitrary code remotely. These vulnerabilities pose a severe risk... The post CVE-2024-29201 & CVE-2024-29202 Flaws Expose JumpServer Users to RCE Attacks appeared first on Penetration Testing.

article thumbnail

Google now blocks spoofed emails for better phishing protection

Bleeping Computer

Google has started automatically blocking emails sent by bulk senders who don't meet stricter spam thresholds and authenticate their messages as required by new guidelines to strengthen defenses against spam and phishing attacks. [.

Phishing 138
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New Vultur malware version includes enhanced remote control and evasion capabilities

Security Affairs

Researchers detected a new version of the Vultur banking trojan for Android with enhanced remote control and evasion capabilities. Researchers from NCC Group discovered a new version of the Vultur banking trojan for Android that includes new enhanced remote control and evasion capabilities. Some of the new features implemented in this variant include the ability to: Download, upload, delete, install, and find files; Control the infected device using Android Accessibility Services (sending comman

Malware 136
article thumbnail

Detecting Windows-based Malware Through Better Visibility

The Hacker News

Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk.

Malware 134
article thumbnail

Bitdefender CVE-2023-6154 Flaw Alert: Update Now to Prevent Potential Privilege Escalation

Penetration Testing

Bitdefender, a leading provider of cybersecurity solutions, has released a critical patch addressing a vulnerability in its popular Total Security, Internet Security, Antivirus Plus, and Antivirus Free products. This vulnerability, designated CVE-2023-6154, carries a... The post Bitdefender CVE-2023-6154 Flaw Alert: Update Now to Prevent Potential Privilege Escalation appeared first on Penetration Testing.

article thumbnail

The Incognito Mode Myth Has Fully Unraveled

WIRED Threat Level

To settle a years-long lawsuit, Google has agreed to delete “billions of data records” collected from users of “Incognito mode,” illuminating the pitfalls of relying on Chrome to protect your privacy.

126
126
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CVE-2024-2975: Octopus Deploy Patches Critical Privilege Escalation Vulnerability

Penetration Testing

Octopus Deploy, the popular deployment automation platform, has released a security advisory and subsequent patches to address a critical vulnerability (CVE-2024-2975). This flaw could allow attackers to escalate their privileges under specific configurations, potentially... The post CVE-2024-2975: Octopus Deploy Patches Critical Privilege Escalation Vulnerability appeared first on Penetration Testing.

article thumbnail

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

The Hacker News

The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams.

article thumbnail

Qualcomm Addresses Critical Security Vulnerabilities in April Bulletin

Penetration Testing

US-based chip giant Qualcomm has released a critical security bulletin patching a major flaw along with 11 other high-severity vulnerabilities. The most serious of these vulnerabilities (CVE-2024-21473) carries a CVSS score of 9.8 and... The post Qualcomm Addresses Critical Security Vulnerabilities in April Bulletin appeared first on Penetration Testing.

article thumbnail

Webinar Recap: Cybersecurity Trends to Watch in 2024

Security Boulevard

Predicting the future of cybersecurity is an impossible task, but getting some expert advice doesn’t. The post Webinar Recap: Cybersecurity Trends to Watch in 2024 appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

OWASP discloses data breach caused by wiki misconfiguration

Bleeping Computer

The OWASP Foundation has disclosed a data breach after some members' resumes were exposed online due to a misconfiguration of its old Wiki web server. [.

article thumbnail

Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code

Security Boulevard

The open source community, federal agencies, and cybersecurity researchers are still trying to get their hands around the security near-miss of the backdoor found in versions of the popular XZ Utils data compression library, malicious code that apparently was methodically put together by bad actors over more than two years and incidentally discovered by a.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

Vendors and researchers disclosed a wide range of vulnerabilities this week from common Cisco IOS, Fortinet, and Windows Server issues to more focused flaws affecting developers (PyPI), artificial intelligence (Ray, NVIDIA), and industrial controls (Rockwell Automation). While most issues can be fixed through prompt patching and updating, a few remain unfixed and may require more significant changes to the security stack to block possible attacks.

article thumbnail

The Best SIEM Tools To Consider in 2024

Security Boulevard

What is a SIEM? SIEM solutions enable enterprises to monitor and analyze security-related data from a variety of sources, such as firewalls, intrusion detection systems (IDS), and endpoint security devices. By collecting and analysing this data, companies can spot patterns that may signal a security breach, allowing them to take quick and appropriate action to […] The post The Best SIEM Tools To Consider in 2024 appeared first on Centraleyes.

Firewall 120
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

'Darcula' Phishing Service Unleashes Sophisticated Smishing Attacks

SecureWorld News

A new Phishing-as-a-Service (PhaaS) threat called "darcula" is taking advantage of encrypted mobile messaging services to unleash a wave of sophisticated smishing attacks targeting organizations across more than 100 countries. The darcula platform provides cybercriminals with easy access to branded phishing campaigns mimicking postal services, utilities, banks, airlines, and more through more than 20,000 phishing domains.

Phishing 107
article thumbnail

The AI Revolution in Access Management: Intelligent Provisioning and Fraud Prevention

Security Boulevard

AI revolutionizes access management by enabling intelligent provisioning, dynamic access control, and fraud prevention. Using machine learning and predictive analytics, it ensures consistent access policies and detects anomalous behavior in real time. The post The AI Revolution in Access Management: Intelligent Provisioning and Fraud Prevention appeared first on Security Boulevard.

article thumbnail

Cryptocurrency and Blockchain security due diligence: A guide to hedge risk

Cisco Security

Blockchain technology has experienced remarkable adoption in recent years, driven by its use across a broad spectrum of institutions, governments, retail investors, and users. However, this surge in… Read more on Cisco Blogs Blockchain adoption and crypto investments are peaking, along with scams. Ensure safety in this bull run by being diligent.

article thumbnail

The Top MSP KPIs and Metrics You Should Measure as a Managed Service Provider

Heimadal Security

When you’re running an MSP, it’s easy to lose sight of the bigger picture. You’re fighting fires, managing people, dealing with clients, and the million-and-one other things a business owner does. This means that weeks or even months can go by, without taking the time to really assess the health of your business. And this […] The post The Top MSP KPIs and Metrics You Should Measure as a Managed Service Provider appeared first on Heimdal Security Blog.

103
103
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

India rescues 250 citizens enslaved by Cambodian cybercrime gang

Bleeping Computer

The Indian government says it rescued and repatriated 250 citizens who sought jobs in Cambodia, only to be forced into conducting cybercrime once they arrived. [.

article thumbnail

Millions Impacted in Mass Passcode Reset of AT&T Accounts

Security Boulevard

AT&T has initiated a mass reset of millions of customer account passcodes following a reported data breach. The post Millions Impacted in Mass Passcode Reset of AT&T Accounts appeared first on Enzoic. The post Millions Impacted in Mass Passcode Reset of AT&T Accounts appeared first on Security Boulevard.

article thumbnail

FTC: Americans lost $1.1 billion to impersonation scams in 2023

Bleeping Computer

Impersonation scams in the U.S. exceeded $1.1 billion in losses last year, according to statistics collected by the Federal Trade Commission (FTC), a figure that is three times higher than in 2020. [.

Scams 94
article thumbnail

A week in security (March 25 – March 31)

Malwarebytes

Last week on Malwarebytes Labs: MFA bombing taken to the next level How to back up your Mac How to back up your Windows 10/11 PC to OneDrive How to back up your iPhone to a Windows computer How to back up your iPhone to a Mac How to back up your iPhone to iCloud Powering the future of ThreatDown with AI Stopping a K-12 cyberattack (SolarMarker) with ThreatDown MDR Facebook spied on Snapchat users to get analytics about the competition Update Chrome now!

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!