Category: EN

Drug Dealers Have Moved on to Social Media

The marketing of illegal drugs on open platforms is “gaining prominence,” authorities note, while the number of drug transactions on the dark web has decreased in recent years. This article has been indexed from Security Latest Read the original article:…

ThreatQuotient ThreatQ Platform

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: ThreatQuotient Inc. Equipment: ThreatQ Platform Vulnerability: Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform remote code execution. 3.…

BD Diagnostic Solutions Products

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: Diagnostic Solutions Products Vulnerability: Use of Default Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to…

Hitachi Energy TropOS Devices Series 1400/2400/6400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: TropOS Devices Series 1400/2400/6400 Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a…

Schneider Electric Modicon

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M241 / M251 / M258 / LMC058 Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could lead to…

CISA Releases Five Industrial Control Systems Advisories

CISA released five Industrial Control Systems (ICS) advisories on December 17, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-352-01 ThreatQuotient ThreatQ Platform ICSA-24-352-02 Hitachi Energy TropOS Devices Series 1400/2400/6400 ICSA-24-352-03 Rockwell Automation…

Cybercriminals Exploit Google Calendar to Spread Malicious Links

Check Point research reveals cybercriminals are using Google Calendar and Drawings to send malicious links, bypassing traditional email security This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Exploit Google Calendar to Spread Malicious Links

Kali Linux 2024.4: A Powerful Upgrade for Penetration Testers

Kali Linux, a widely-used penetration testing and security auditing Linux distribution, has released its latest version, 2024.4. This… The post Kali Linux 2024.4: A Powerful Upgrade for Penetration Testers appeared first on Hackers Online Club. This article has been indexed…

How to Stop DDoS Attacks in Three Stages

Quickly stopping a DDoS attack is crucial for your business’s survival. Here are three effective stages to prevent and mitigate DDoS attacks. The post How to Stop DDoS Attacks in Three Stages appeared first on eSecurity Planet. This article has…

Attackers Can Find New APIs in 29 Seconds: Wallarm

Cybersecurity vendor Wallarm, using a honeypot, found that hackers can discover new APIs in 29 seconds and that APIs are now more targeted than web applications, highlighting the need to put a security focus on the increasingly popular business tools.…

Exploring and Mitigating AI-Driven Cybercrime

A new collaboration with UC Berkeley explores the dynamics of AI-powered cybercrime and how defenders should respond.        This article has been indexed from Fortinet Industry Trends Blog Read the original article: Exploring and Mitigating AI-Driven Cybercrime

Top 5 Cryptographic Key Protection Best Practices

We’re sharing top 5 cryptographic key protection best practices. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Zimperium. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Security Boulevard. This article has been…

Review of Blackhat EMEA 2024

A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut. The post Review of Blackhat EMEA 2024 appeared first on Security Boulevard. This article…

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2024: Key findings

EU Sanctions Russian Cyber Actors for “Destabilizing Actions”

The EU announced sanctions against individuals and entities involved in cyber-attacks and disinformation campaigns on behalf of the Russian state This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Sanctions Russian Cyber Actors for “Destabilizing Actions”

Drug Dealers Have Moved Onto Social Media

The marketing of illegal drugs on open platforms is “gaining prominence,” authorities note, while the number of drug transactions on the darkweb has decreased in recent years. This article has been indexed from Security Latest Read the original article: Drug…

Malvertising on steroids serves Lumma infostealer

A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the users’ perspective Internet users usually…

FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems

FBI says HiatusRAT’s operators were seen scanning for web cameras and DVR systems affected by years-old vulnerabilities. The post FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

RunSafe Security Platform enhances risk management with automation

RunSafe Security has released the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers can generate a high-fidelity software bill of materials (SBOM) at build time, ensuring the highest level of accuracy in identifying…

US Senate Criticises Amazon Over Warehouse Safety

Senate study finds Amazon did not implement protections recommended by internal studies over risk they could affect worker productivity This article has been indexed from Silicon UK Read the original article: US Senate Criticises Amazon Over Warehouse Safety

Meta Adds ‘Live AI’ To Ray-Ban Smart Glasses

Facebook parent Meta adds AI voice chat, live translation to Ray-Ban Meta smart glasses as it competes with Apple, Google, OpenAI This article has been indexed from Silicon UK Read the original article: Meta Adds ‘Live AI’ To Ray-Ban Smart…

London’s CNI is Under Threat

London is one of the smartest and most interconnected cities in the world. Digital infrastructure plays a role in almost every facet of society, streamlining public transport, improving healthcare provision, boosting sustainability, and more. However, this reliance on technology has…

SandboxAQ Advances Global Cybersecurity Through Series of Milestones

SandboxAQ, a leading technology company, has achieved significant milestones in cybersecurity research and development. The company’s dedicated team has made substantial contributions to the field, particularly in post-quantum cryptography (PQC). In 2024 alone, SandboxAQ has published 18 peer-reviewed papers, bringing…

CISA Warns of Exploited Adobe ColdFusion, Windows Vulnerabilities

CISA has warned organizations that two vulnerabilities affecting Adobe ColdFusion and Windows have been exploited in the wild.  The post CISA Warns of Exploited Adobe ColdFusion, Windows Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

New APIs Discovered by Attackers in Just 29 Seconds

Wallarm honeypot research finds potentially exposed APIs are being discovered within half a minute This article has been indexed from www.infosecurity-magazine.com Read the original article: New APIs Discovered by Attackers in Just 29 Seconds

TikTok Shop US Sales Surpass Shein, Sephora

After launching in September 2023, TikTok Shop rises to broad popularity with US sales surpassing Shein, Sephora as it faces ban This article has been indexed from Silicon UK Read the original article: TikTok Shop US Sales Surpass Shein, Sephora

16-30 September 2024 Cyber Attacks Timeline

In the second timeline of September 2024 I collected 130 events (8.67 events/day) with a threat landscape… This article has been indexed from HACKMAGEDDON Read the original article: 16-30 September 2024 Cyber Attacks Timeline

US Unveils New National Cyber Incident Response Plan

The draft plan is designed to help businesses understand how the government will support them during a cyber incident This article has been indexed from www.infosecurity-magazine.com Read the original article: US Unveils New National Cyber Incident Response Plan

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a typically harmless security feature, to launch large-scale malware distribution campaigns. This startling revelation uncovers how these fake captchas, interlaced with malicious advertising, are infecting users with…

Pumakit Rootkit Challenges Linux Security Systems

  According to the researchers from the Elastic Security Lab, a new rootkit called PUMAKIT can perform various advanced evasion mechanisms. When Elastic Security researchers discovered PUMAKIT while routinely hunting for threats on VirusTotal, they described it as PUMAKIT. Many…

All Major European Financial Firms Suffer Supplier Breaches

SecurityScorecard claims 100% of Europe’s top financial services companies have suffered a supply chain breach in the past year This article has been indexed from www.infosecurity-magazine.com Read the original article: All Major European Financial Firms Suffer Supplier Breaches

Bitcoin Hits New High Over $107,000 On Trump Comments

Bitcoin surges more than 5 percent after Trump reaffirms plans for national strategic crypto reserve, as optimism grows This article has been indexed from Silicon UK Read the original article: Bitcoin Hits New High Over $107,000 On Trump Comments

China Chip Investment Plummets Amidst US Restrictions

Investment in China’s semiconductor industry falls by one-third this year as US tightens restrictions, state funding now dominates This article has been indexed from Silicon UK Read the original article: China Chip Investment Plummets Amidst US Restrictions

U.S. CISA adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference (CVE-2024-35250) and…

Download a banker to track your parcel

The Mamont banking trojan is spreading under the guise of a parcel-tracking app for fake stores claiming to offer goods at wholesale prices. This article has been indexed from Securelist Read the original article: Download a banker to track your…

Python Delivering AnyDesk Client as RAT, (Tue, Dec 17th)

RATs or “Remote Access Tools” are very popular these days. From an attacker&#x27s point of view, it&#x27s a great way to search and exfiltrate interesting data but also to pivot internally in the network. Besides malicious RATs, they are legit…

ConnectOnCall Data Breach, 900,000 Customers Data Exposed

 The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach that compromised the personal information of 900,000 patients and healthcare providers. The platform, designed to streamline after-hours communications between patients and healthcare providers, discovered the…

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant vulnerabilities to its Known Exploited Vulnerabilities Catalog. These vulnerabilities, actively exploited by malicious actors, underscore the growing risks facing organizations. Adobe ColdFusion Access Control Weakness…

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with notable updates, including new tools and enhancements. This highly anticipated update caters to the needs of security professionals, ethical hackers, and tech enthusiasts with a…

Nine Updated Security Measures for the Modern Smart Home

Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…

The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the complex, global cybersecurity challenges that businesses, governments…

9 Updated Security Measures for the Modern Smart Home

Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…

Cybersecurity jobs available right now: December 17, 2024

CISO ONE Security | Israel | Hybrid – View job details As a CISO, you will be responsible for overseeing information security, cybersecurity, application security, and business continuity strategies. The role involves implementing and managing security measures and collaborating with…

Link Trap: GenAI Prompt Injection Attack

Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article has been…