Tag: EN

December 2024 Web Server Survey

In the December 2024 survey we received responses from 1,149,724,280 sites across 272,582,582 domains and 13,260,653 web-facing computers. This reflects an increase of 8.6 million sites, 550,526 domains, and 146,420 web-facing computers. nginx experienced the largest gain of 6.4 million…

Siemens User Management Component

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens’ ProductCERT Security Advisories (CERT Services | Services |…

Delta Electronics DTM Soft

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: DTM Soft Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. 3.…

CISA Releases Eight Industrial Control Systems Advisories

CISA released eight Industrial Control Systems (ICS) advisories on December 19, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-354-01 Hitachi Energy RTU500 series CMU ICSA-24-354-02 Hitachi Energy SDM600 ICSA-24-354-03 Delta Electronics DTM…

Hitachi Energy RTU500 series CMU

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.9 ATTENTION: Exploitable remotely Vendor: Hitachi Energy Equipment: RTU500 series CMU Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an…

Schneider Electric Accutech Manager

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Accutech Manager Vulnerability: Classic Buffer Overflow 2. RISK EVALUATION Successful exploitation could allow an attacker to cause a crash of the Accutech Manager…

New Malware Can Kill Engineering Processes in ICS Environments

Forescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations This article has been indexed from www.infosecurity-magazine.com Read the original article: New Malware Can Kill Engineering Processes in ICS Environments

schenkYOU – 237,349 breached accounts

In September 2024, data from the online German gift store schenkYOU was put up for sale on a popular hacking forum. Obtained the month before, the data included 237k unique email addresses alongside names, dates of birth and salted SHA-256…

New Mobile Phishing Targets Executives with Fake DocuSign Links

Cybercriminals are using advanced techniques to target executives with mobile-specific phishing attacks. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: New Mobile Phishing Targets Executives with Fake DocuSign Links

Cisco to Acquire Threat Detection Company SnapAttack

Cisco has announced its intention to acquire threat detection company SnapAttack to boost Splunk security product capabilities.  The post Cisco to Acquire Threat Detection Company SnapAttack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

CISA Mandates Federal Agencies Secure Their Cloud Environments

CISA is requiring all federal agencies to adopt stronger measures to improve their SaaS configurations and protect their complex cloud environments against growing threats from hackers, who are increasingly targeting third parties like cloud providers. The post CISA Mandates Federal…

Fortinet Patches Critical FortiWLM Vulnerability

Fortinet has released patches for a critical-severity path traversal vulnerability in FortiWLM that was reported last year. The post Fortinet Patches Critical FortiWLM Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Fortinet…

What could the API Landscape look like in 2025?

As we step into 2025, the API landscape is undergoing a transformative shift, redefining how businesses innovate and scale. APIs are no longer just enablers of connectivity; they are the architects of ecosystems, powering everything from seamless automation to AI-driven…

SandboxAQ Raises $300 Million at $5.3 Billion Valuation

Alphabet spinoff SandboxAQ has announced raising $300 million in funding at a valuation of $5.3 billion. The post SandboxAQ Raises $300 Million at $5.3 Billion Valuation  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Exploring vulnerable Windows drivers

This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about  malicious Windows drivers. This article has been indexed from Cisco Talos Blog…

Japanese Space Start-Up Destroys Second Rocket After Launch

Japanese start-up Space One destroys Kairos rocket for second time shortly after launch, as country tries to jump-start space industry This article has been indexed from Silicon UK Read the original article: Japanese Space Start-Up Destroys Second Rocket After Launch

US Supreme Court Agrees To Hear TikTok Appeal

US Supreme Court says it will hear appeal of TikTok and parent ByteDance against ban law, but does not issue emergency injunction This article has been indexed from Silicon UK Read the original article: US Supreme Court Agrees To Hear…

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob Lee, rejecting self-defence claim This article has been indexed from Silicon UK Read the original article: Momeni Convicted In Bob Lee Murder

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals, prompting privacy complaint This article has been indexed from Silicon UK Read the original article: EU Publishes iOS Interoperability Plans

Silent Heists: The Danger of Insider Threats

When thinking about cybersecurity, we envision malicious actors working in dark basements, honing their tools to invent cunning new ways to breach our defenses. While this is a clear and present danger, it’s also important to understand that another hazard…

September 2024 Cyber Attacks Statistics

After the corresponding cyber attacks timelines, it’s time to publish the statistics for September 2024 where I collected and analyzed 257 events. During September 2024… This article has been indexed from HACKMAGEDDON Read the original article: September 2024 Cyber Attacks…

CISA Proposes National Cyber Incident Response Plan

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP), inviting public feedback on the draft. This highly anticipated revision, outlined in a pre-decisional public comment draft released this month,…

2025 Predictions for the Cyberwarfare Landscape

As cyberattacks become more frequent and targeted, the potential for significant collateral damage increases, complicating efforts to maintain societal resilience. Looking ahead to 2025, the question we must ask ourselves is: how can we protect our most vulnerable infrastructure from…

Happy YARA Christmas!

In the ever-evolving landscape of cybersecurity, effective threat detection is paramount. Since its creation, YARA stands out as a powerful tool created to identify and classify malware. Originally developed by Victor Alvarez of VirusTotal, YARA has become a vital tool…

What 2025 May Hold for Cybersecurity

Cybersecurity is dynamic, ever changing and unpredictable. This past year contained significant surprises. Who would have thought the largest data breach incident of 2024 would involve no malware or vulnerability exploitation? Subject matter experts often make inaccurate predictions. Rather than…

Ukrainian hacker gets prison for infostealer operations

Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS). Individuals who deployed Raccoon…

Facebook ‘Restricted’ Palestinian News Content

Facebook has ‘severely restricted’ news content from Palestinian outlets since October 2023 amidst bias concerns, says BBC report This article has been indexed from Silicon UK Read the original article: Facebook ‘Restricted’ Palestinian News Content

Digital Trust Is Declining. Businesses Must Respond

Once a cornerstone of the digital promise, trust has been undermined by corporate misuse, data breaches, disinformation, and the growing realization that what we see online might not even be real. The effects are far-reaching, touching not only our interactions…

Next.js Vulnerability Let Attackers Bypass Authentication

A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific circumstances. The issue, cataloged as CVE-2024-51479, affects versions from 9.5.5 up to 14.2.14. Developers using these versions must quickly upgrade…

BitView – 63,127 breached accounts

In December 2024, the video sharing Community BitView suffered a data breach that exposed 63k customer records. Attributed to a backup taken by a previous administrator earlier in the year, the breach exposed email and IP addresses, bcrypt password hashes,…

NetSPI introduces external attack surface management solutions

NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous threat exposure management (CTEM) model and…

Amazon Faces Strike Action In US Ahead Of Christmas

Amazon faces strike actions at facilities across US days before Christmas as union members authorise action over contract negotiations This article has been indexed from Silicon UK Read the original article: Amazon Faces Strike Action In US Ahead Of Christmas

Python-Based NodeStealer Version Targets Facebook Ads Manager

In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This…

AI Models at Risk from TPUXtract Exploit

  A team of researchers has demonstrated that it is possible to steal an artificial intelligence (AI) model without actually gaining access to the device that is running the model. The uniqueness of the technique lies in the fact that…

The AI Threat: It’s Real, and It’s Here

We’re at a defining moment in cybersecurity that will determine organizational survival. Transform or be transformed by a competitor—this isn’t a slogan, it’s a survival mandate. As organizations integrate AI into their business and security operations, they face increased identity…

Acumen Threat Analysis: Preparing for 2025

Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned about the risks posed by insiders.  The…

Understanding Virtual Skimmers: A Threat to E-Commerce Security

Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late. The post Understanding Virtual Skimmers: A Threat to E-Commerce Security  appeared first on Security Boulevard. This article has been indexed from…

The 2025 cyber security threat landscape

The cybersecurity landscape in 2025 is sure to undergo transformative shifts driven by technological advancements and evolving global threats. The integration of AI into cybercriminal operations, the growing reliance on tokenized payment systems, and the increasing intersection of geopolitics with…

Chrome Security Update, Patch for Multiple Security Flaws

Google has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205 for Windows and Mac and 131.0.6778.204 for Linux. This update addresses multiple high-severity vulnerabilities, ensuring enhanced safety for users. The rollout will occur gradually over the coming…

TP Link routers to be banned for data security concerns

During the previous administration under President Donald Trump, Chinese telecom and networking equipment suppliers, including ZTE and Huawei, faced significant trade restrictions in the United States. These bans are still in effect under President Joe Biden’s administration, with no signs…