A new macOS-targeting hVNC malware family is being advertised on a prominent cybercrime forum. The post New hVNC macOS Malware Advertised on Hacker Forum appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Tag: SecurityWeek RSS Feed
Google AMP Abused in Phishing Attacks Aimed at Enterprise Users
Threat actors are using Google AMP URLs in phishing campaigns as a new detection evasion tactic. The post Google AMP Abused in Phishing Attacks Aimed at Enterprise Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Firefox 116 Patches High-Severity Vulnerabilities
Firefox 116 was released with patches for 14 CVEs, including nine high-severity vulnerabilities, some of which can lead to remote code execution or sandbox escapes. The post Firefox 116 Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been…
Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack
The recently patched Ivanti EPMM zero-day CVE-2023-35078 has been exploited to hack the Norwegian government since at least April 2023. The post Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack appeared first on SecurityWeek. This…
Forgepoint Capital Places $15M Series A Bet on Converge Insurance
Forgepoint Capital makes another investment in the cyber-insurance sector with a $15 million Series A investment in Converge Insurance. The post Forgepoint Capital Places $15M Series A Bet on Converge Insurance appeared first on SecurityWeek. This article has been indexed…
Forgepoint Capital Places $20M Series A Bet on Converge Insurance
Forgepoint Capital makes another investment in the cyber-insurance sector with a $15 million Series A investment in Converge Insurance. The post Forgepoint Capital Places $20M Series A Bet on Converge Insurance appeared first on SecurityWeek. This article has been indexed…
Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups
Researchers unmask an Iranian-run company providing command-and-control services to hacking groups, including state-sponsored APT actors. The post Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack
A new power side-channel attack named Collide+Power can allow an attacker to obtain sensitive information and it works against nearly any modern CPU. The post Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack appeared first on SecurityWeek.…
SpecterOps Updates BloodHound Active Directory Mapping Tool
SpecterOps announces version 5.0 of BloodHound Active Directory mapping tool with enterprise-grade deployment, usability, and UI. The post SpecterOps Updates BloodHound Active Directory Mapping Tool appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
Silk Security Emerges from Stealth With $12.5 Million Seed Funding
Silk Security raised $12.5 million in seed funding and is on a mission to break down the silos between security and development with an integrated ‘find and fix’ platform. The post Silk Security Emerges from Stealth With $12.5 Million Seed…
Nile Raises $175 Million for Secure NaaS Solutions
Network-as-a-service (NaaS) solutions provider Nile has raised $175 million in a Series C funding round that brings the total raised by the firm to $300 million. The post Nile Raises $175 Million for Secure NaaS Solutions appeared first on SecurityWeek.…
Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups
San Francisco startup Socket raises $20 million as investors continue to bet on companies in the open source software security category. The post Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups appeared first on SecurityWeek. This…
Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter
SecurityWeek speaks to Youssef Sammouda about using cybersecurity research and bug bounties as a way of life and source of income. The post Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter appeared first on SecurityWeek. This article has been indexed from…
Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack
Bedding products provider Tempur Sealy says it has shut down certain systems following a cyberattack. The post Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report
The number of ransomware attacks targeting industrial organizations and infrastructure has doubled since the second quarter of 2022, according to Dragos. The post Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report appeared first on SecurityWeek. This article has…
200 Canon Printer Models May Expose Wi-Fi Connection Data
Canon says more than 200 inkjet printer models fail to properly erase Wi-Fi configuration settings. The post 200 Canon Printer Models May Expose Wi-Fi Connection Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report
China has implanted malware in key US power and communications networks in a “ticking time bomb” that could disrupt the military in event of a conflict The post Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report appeared…
US Gov Rolls Out National Cyber Workforce, Education Strategy
The Biden administration on Monday announced a series of “generational investments” to address immediate and long-term cyber workforce needs. The post US Gov Rolls Out National Cyber Workforce, Education Strategy appeared first on SecurityWeek. This article has been indexed from…
Reddit Taps Fredrick ‘Flee’ Lee for CISO Job
Reddit hires a 20-year cybersecurity veteran to manage its privacy and security functions as it prepares for an IPO. The post Reddit Taps Fredrick ‘Flee’ Lee for CISO Job appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Apple Lists APIs That Developers Can Only Use for Good Reason
To boost user privacy, Apple is requiring app developers to declare a reason to use specific APIs. The post Apple Lists APIs That Developers Can Only Use for Good Reason appeared first on SecurityWeek. This article has been indexed from…
CISA Analyzes Malware Used in Barracuda ESG Attacks
CISA has shared analysis reports on three malware families obtained from an organization hacked via a recent Barracuda ESG vulnerability. The post CISA Analyzes Malware Used in Barracuda ESG Attacks appeared first on SecurityWeek. This article has been indexed from…
Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks
Ivanti EPMM customers have been warned of CVE-2023-35081, a second zero-day vulnerability that has been exploited in targeted attacks. The post Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks appeared first on SecurityWeek. This article has been indexed from…
In Other News: Data Breach Cost Rises, Russia Targets Diplomats, Tracker Alerts in Android
Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of July 24, 2023. The post In Other News: Data Breach Cost Rises, Russia Targets Diplomats, Tracker Alerts in…
US, Australia Issue Warning Over Access Control Vulnerabilities in Web Applications
US and Australian government agencies provide guidance on addressing access control vulnerabilities in web applications. The post US, Australia Issue Warning Over Access Control Vulnerabilities in Web Applications appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Industry Reactions to New SEC Cyber Incident Disclosure Rules: Feedback Friday
Several industry professionals comment on the SEC’s new cybersecurity incident disclosure rules and their implications. The post Industry Reactions to New SEC Cyber Incident Disclosure Rules: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins
The first attempts to exploit CVE-2023-24489, a recent critical Citrix ShareFile remote code execution vulnerability, have been observed. The post Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Zimbra Patches Exploited Zero-Day Vulnerability
Zimbra has released patches for a cross-site scripting (XSS) vulnerability that has been exploited in malicious attacks. The post Zimbra Patches Exploited Zero-Day Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices
Several vulnerabilities found in Weintek Weincloud could have allowed hackers to manipulate and damage ICS, including PLCs and field devices. The post Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices appeared first on SecurityWeek. This article has been indexed…
CoinsPaid Blames North Korean Hackers for $37 Million Cryptocurrency Heist
CoinsPaid says North Korean hacking group Lazarus is likely responsible for the recent theft of $37 million in cryptocurrency. The post CoinsPaid Blames North Korean Hackers for $37 Million Cryptocurrency Heist appeared first on SecurityWeek. This article has been indexed…
US Senator Wyden Accuses Microsoft of ‘Cybersecurity Negligence’
Redmond is accused of “negligent cybersecurity practices” that enabled a successful Chinese hack of the United States government. The post US Senator Wyden Accuses Microsoft of ‘Cybersecurity Negligence’ appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Multiple Security Issues Identified in Peloton Fitness Equipment
Internet-connected Peloton workout equipment is impacted by multiple security risks, such as having USB debugging enabled. The post Multiple Security Issues Identified in Peloton Fitness Equipment appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Watch Now: Exposing Common Myths of OT Cybersecurity
Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the evolving threat landscape. The post Watch Now: Exposing Common Myths of OT Cybersecurity appeared first on…
TSA Updates Pipeline Cybersecurity Requirements
The TSA has released updated cybersecurity requirements for pipeline owners and operators, instructing them to test assessment and incident response plans. The post TSA Updates Pipeline Cybersecurity Requirements appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Head of US Cybersecurity Agency Sees Progress on Election Security, With More Work Needed for 2024
CISA Director Jen Easterly says more is needed to defend the integrity and resiliency of the election process ahead of the 2024 election. The post Head of US Cybersecurity Agency Sees Progress on Election Security, With More Work Needed for…
European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding
Threat intelligence services provider QuoIntelligence has raised €5 million ($5.5 million) in seed funding. The post European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Two New Vulnerabilities Could affect 40% of Ubuntu Cloud Workloads
Researchers discovered two vulnerabilities in the Ubuntu OverlayFS module: CVE-2023-2640 and CVE-2023-32629 (together dubbed ‘GameOver(lay)’). The post Two New Vulnerabilities Could affect 40% of Ubuntu Cloud Workloads appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
The Good, the Bad and the Ugly of Generative AI
Thinking through the good, the bad, and the ugly now is a process that affords us “the negative focus to survive, but a positive one to thrive.” The post The Good, the Bad and the Ugly of Generative AI appeared…
Axis Door Controller Vulnerability Exposes Facilities to Physical, Cyber Threats
An Axis network door controller vulnerability can be exploited to target facilities, exposing them to both physical and cyber threats. The post Axis Door Controller Vulnerability Exposes Facilities to Physical, Cyber Threats appeared first on SecurityWeek. This article has been…
CardioComm Takes Systems Offline Following Cyberattack
Canadian medical software provider CardioComm has taken systems offline to contain a cyberattack. The post CardioComm Takes Systems Offline Following Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: CardioComm Takes…
Up to 11 Million People Hit by MOVEit Hack at Government Services Firm Maximus
Maximus Inc says that the personal information of 8 to 11 million individuals was stolen in the MOVEit cyberattack. The post Up to 11 Million People Hit by MOVEit Hack at Government Services Firm Maximus appeared first on SecurityWeek. This…
Companies Required by SEC to Disclose Cybersecurity Incidents in 4 Days
The SEC has adopted new rules requiring public companies to disclose cybersecurity breaches that have a material impact within four days. The post Companies Required by SEC to Disclose Cybersecurity Incidents in 4 Days appeared first on SecurityWeek. This article…
Wiz Says 62% of AWS Environments Exposed to Zenbleed Exploitation
Researchers say a whopping 62 percent of AWS environments may be exposed to the newly documented AMD ‘Zenbleed’ information leak flaw. The post Wiz Says 62% of AWS Environments Exposed to Zenbleed Exploitation appeared first on SecurityWeek. This article has…
Ex-NSA Official Harry Coker Tapped for National Cyber Director Job
The Biden administration has nominated former Navy commander Harry Coker to replace the retired Chris Inglis. The post Ex-NSA Official Harry Coker Tapped for National Cyber Director Job appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Cyclops Emerges From Stealth With Security Search Platform Powered by Generative AI
Cyclops emerges from stealth mode with $6.4 million in seed funding and a generative AI-powered cybersecurity search platform. The post Cyclops Emerges From Stealth With Security Search Platform Powered by Generative AI appeared first on SecurityWeek. This article has been…
Dozens of Organizations Targeted by Akira Ransomware
The Akira ransomware operators claim to have compromised 63 organizations since March 2023, mostly SMBs. The post Dozens of Organizations Targeted by Akira Ransomware appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Microsoft Message Queuing Vulnerabilities Allow Remote Code Execution, DoS Attacks
Fortinet has published details on a series of critical- and high-severity vulnerabilities in the Microsoft Message Queuing service. The post Microsoft Message Queuing Vulnerabilities Allow Remote Code Execution, DoS Attacks appeared first on SecurityWeek. This article has been indexed from…
Code Execution Vulnerability Impacts 900k MikroTik Devices
Over 900,000 devices are impacted by an arbitrary code execution vulnerability in MikroTik RouterOS. The post Code Execution Vulnerability Impacts 900k MikroTik Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Russian Cybersecurity Firm Founder Jailed for 14 Years
Russia has sentenced Ilya Sachkov, co-founder of the Group-IB cybersecurity firm, to 14 years in prison on treason charges. The post Russian Cybersecurity Firm Founder Jailed for 14 Years appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Webinar Today: Exposing Common Myths of OT Cybersecurity
Join SecurityWeek and TXOne Networks for a live webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the evolving threat landscape. The post Webinar Today: Exposing Common Myths of OT Cybersecurity appeared first…
CISO Conversations: Field CISOs From VMware Carbon Black and NetSPI
SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role. The post CISO Conversations: Field CISOs From VMware Carbon Black and NetSPI appeared first on SecurityWeek. This article has been indexed from…
Webinar Tomorrow: Exposing Common Myths of OT Cybersecurity
Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the evolving threat landscape. The post Webinar Tomorrow: Exposing Common Myths of OT Cybersecurity appeared first on…
Maritime Cyberattack Database Launched by Dutch University
The NHL Stenden University of Applied Sciences in the Netherlands has launched MCAD, the Maritime Cyber Attack Database. The post Maritime Cyberattack Database Launched by Dutch University appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
TETRA Radio Standard Vulnerabilities Can Expose Military Comms, Industrial Systems
TETRA:BURST – vulnerabilities in widely used radio standard could threaten military and law enforcement communications, as well as ICS. The post TETRA Radio Standard Vulnerabilities Can Expose Military Comms, Industrial Systems appeared first on SecurityWeek. This article has been indexed…
Thales Acquiring Imperva From Thoma Bravo for $3.6 Billion
French aerospace, defense, and security giant Thales is acquiring cybersecurity firm Imperva from Thoma Bravo in a $3.6 billion deal. The post Thales Acquiring Imperva From Thoma Bravo for $3.6 Billion appeared first on SecurityWeek. This article has been indexed…
AMD CPU Vulnerability ‘Zenbleed’ Can Expose Sensitive Information
AMD has released microcode patches to address Zenbleed, a vulnerability in its Zen 2 CPUs that can allow an attacker to access sensitive information. The post AMD CPU Vulnerability ‘Zenbleed’ Can Expose Sensitive Information appeared first on SecurityWeek. This article…
Ivanti Zero-Day Vulnerability Exploited in Attack on Norwegian Government
An Ivanti EPMM product zero-day vulnerability tracked as CVE-2023-35078 has been exploited in an attack aimed at the Norwegian government. The post Ivanti Zero-Day Vulnerability Exploited in Attack on Norwegian Government appeared first on SecurityWeek. This article has been indexed…
Apple Patches Another Kernel Flaw Exploited in ‘Operation Triangulation’ Attacks
Apple patches another zero-day flaw used in the ‘Operation Triangulation’ exploit chain. iOS and macOS-powered devices are affected. The post Apple Patches Another Kernel Flaw Exploited in ‘Operation Triangulation’ Attacks appeared first on SecurityWeek. This article has been indexed from…
Nubeva’s Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab
100% key capture rate and successful ransomware decryption shows progress in ransomware defense capabilities. The post Nubeva’s Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
OneTrust Raises $150 Million at $4.5 Billion Valuation
Privacy management solutions provider OneTrust raises $150 million at a $4.5 billion valuation. The post OneTrust Raises $150 Million at $4.5 Billion Valuation appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Over 20,000 Citrix Appliances Vulnerable to New Exploit
Over 20,000 appliances are vulnerable to a new exploit technique targeting a recent Citrix ADC zero-day vulnerability CVE-2023-3519. The post Over 20,000 Citrix Appliances Vulnerable to New Exploit appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Los Angeles SIM Swapper Pleads Guilty to Cybercrime Charges
Amir Golshan, of Los Angeles, pleaded guilty to perpetrating multiple cybercrime schemes using SIM swapping. The post Los Angeles SIM Swapper Pleads Guilty to Cybercrime Charges appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows
Experts believe the Cl0p ransomware gang could earn as much as $100 million from the MOVEit hack, with the number of confirmed victims approaching 400. The post MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows appeared…
Cybersecurity Public-Private Partnership: Where Do We Go Next?
Sharing threat information and cooperating with other threat intelligence groups helps to strengthen customer safeguards and boosts the effectiveness of the cybersecurity sector overall. The post Cybersecurity Public-Private Partnership: Where Do We Go Next? appeared first on SecurityWeek. This article…
Industrial Organizations in Eastern Europe Targeted by Chinese Cyberspies
The China-linked cyberspy group APT31 is believed to be behind a data-theft campaign targeting industrial organizations in Eastern Europe. The post Industrial Organizations in Eastern Europe Targeted by Chinese Cyberspies appeared first on SecurityWeek. This article has been indexed from…
Perimeter81 Vulnerability Disclosed After Botched Disclosure Process
Cybersecurity firm Perimeter81 appears to have botched the responsible disclosure process for a privilege escalation vulnerability found in its macOS application. The post Perimeter81 Vulnerability Disclosed After Botched Disclosure Process appeared first on SecurityWeek. This article has been indexed from…
Atlassian Patches Remote Code Execution Vulnerabilities in Confluence, Bamboo
Atlassian patches high-severity remote code execution vulnerabilities in Confluence and Bamboo products. The post Atlassian Patches Remote Code Execution Vulnerabilities in Confluence, Bamboo appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Microsoft Cloud Hack Exposed More Than Exchange, Outlook Emails
Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online. The post Microsoft Cloud Hack Exposed More Than Exchange, Outlook Emails appeared first on SecurityWeek. This article has been indexed…
Microsoft Cloud Hack Exposed More than Exchange, Outlook Emails
Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online. The post Microsoft Cloud Hack Exposed More than Exchange, Outlook Emails appeared first on SecurityWeek. This article has been indexed…
Google Creates Red Team to Test Attacks Against AI Systems
Google has created a dedicated AI Red Team tasked with carrying out complex technical attacks on artificial intelligence systems. The post Google Creates Red Team to Test Attacks Against AI Systems appeared first on SecurityWeek. This article has been indexed…
Russia Seeks 18 Years in Jail for Founder of Cybersecurity Firm
A Russian prosecutor requested an 18-year prison sentence for Ilya Sachkov, founder of cybersecurity firm Group-IB. The post Russia Seeks 18 Years in Jail for Founder of Cybersecurity Firm appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
In Other News: Military Emails Leaked, Google Restricts Internet Access, Chinese Spyware
Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of July 17, 2023. The post In Other News: Military Emails Leaked, Google Restricts Internet Access, Chinese Spyware appeared…
OpenMeetings Flaws Allow Hackers to Hijack Instances, Execute Code on Servers
Three vulnerabilities in Apache OpenMeetings could be exploited by attackers to take over an administrator account and execute arbitrary code remotely. The post OpenMeetings Flaws Allow Hackers to Hijack Instances, Execute Code on Servers appeared first on SecurityWeek. This article…
Watch Now: Cloud & Data Security Summit Sessions
Watch Cloud & Data Security Summit sessions to learn how to utilize tools, controls, and design models needed to properly secure cloud environments. The post Watch Now: Cloud & Data Security Summit Sessions appeared first on SecurityWeek. This article has…
VirusTotal Provides Clarifications on Data Leak Affecting Premium Accounts
VirusTotal has provided clarifications on the recent data leak that resulted in the exposure of information on 5,600 of the threat analysis service’s customers. The post VirusTotal Provides Clarifications on Data Leak Affecting Premium Accounts appeared first on SecurityWeek. This…
Tampa General Hospital Says Patient Information Stolen in Ransomware Attack
Tampa General Hospital has started informing patients that their personal information was stolen in a ransomware attack. The post Tampa General Hospital Says Patient Information Stolen in Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
GitHub Warns of North Korean Social Engineering Attacks Targeting Tech Firm Employees
North Korean hackers are targeting employees at technology firms with repository invitations and malicious NPM packages. The post GitHub Warns of North Korean Social Engineering Attacks Targeting Tech Firm Employees appeared first on SecurityWeek. This article has been indexed from…
Tech Titans Promise Watermarks to Expose AI Creations
Amazon, Google, Meta, Microsoft, OpenAI and other tech firms have voluntary agreed to AI safeguards set by the White House. The post Tech Titans Promise Watermarks to Expose AI Creations appeared first on SecurityWeek. This article has been indexed from…
Citrix Zero-Day Exploited Against Critical Infrastructure Organization
CISA says the new Citrix zero day vulnerability tracked as CVE-2023-3519 has been exploited against a critical infrastructure organization. The post Citrix Zero-Day Exploited Against Critical Infrastructure Organization appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Multiple DDoS Botnets Exploiting Recent Zyxel Vulnerability
Multiple DDoS botnets have been observed targeting CVE-2023-28771, a Zyxel firewall vulnerability patched in April. The post Multiple DDoS Botnets Exploiting Recent Zyxel Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Human Cyber-Risk Can Be Demonstrably Mitigated by Behavior Changing Training: Analysis
While traditional security awareness teaches users how to recognize social engineering, new behavior changing trains the brain on the correct recognition and response to phishing. The post Human Cyber-Risk Can Be Demonstrably Mitigated by Behavior Changing Training: Analysis appeared first…
Cosmetics Giant Estée Lauder Targeted by Two Ransomware Groups
Estée Lauder has confirmed suffering a data breach just as two ransomware groups claimed to have targeted the company, both allegedly stealing vast amounts of information. The post Cosmetics Giant Estée Lauder Targeted by Two Ransomware Groups appeared first on…
JumpCloud Cyberattack Linked to North Korean Hackers
SentinelOne has linked the recent JumpCloud cyberattack to North Korean hackers, based on the published IoCs. The post JumpCloud Cyberattack Linked to North Korean Hackers appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
New AMI BMC Flaws Allowing Takeover and Physical Damage Could Impact Millions of Devices
Two new serious vulnerabilities in AMI BMC, which is used by millions of devices, can allow attackers to take control of systems and cause physical damage. The post New AMI BMC Flaws Allowing Takeover and Physical Damage Could Impact Millions…
Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities
Adobe releases a second round of patches for recent ColdFusion vulnerabilities, including flaws that have been exploited in attacks. The post Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Famed Hacker Kevin Mitnick Dead at 59
Famed hacker Kevin Mitnick has died after a battle with pancreatic cancer. At the time of his death, he was KnowBe4 Chief Hacking Officer. The post Famed Hacker Kevin Mitnick Dead at 59 appeared first on SecurityWeek. This article has…
Microsoft Bows to Pressure to Free Up Cloud Security Logs
Facing intense pressure after Chinese APT hack, Microsoft plans to expand logging defaults for lower-tier M365 customers. The post Microsoft Bows to Pressure to Free Up Cloud Security Logs appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Recycling Giant Tomra Takes Systems Offline Following Cyberattack
Norwegian recycling giant Tomra says internal systems have been taken offline to contain an extensive cyberattack. The post Recycling Giant Tomra Takes Systems Offline Following Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Recently Patched GE Cimplicity Vulnerabilities Reminiscent of Russian ICS Attacks
Over a dozen vulnerabilities patched by GE in its Cimplicity HMI/SCADA product are reminiscent of ICS attacks conducted by the Russian Sandworm group. The post Recently Patched GE Cimplicity Vulnerabilities Reminiscent of Russian ICS Attacks appeared first on SecurityWeek. This…
Virtual Event Today: 2023 Cloud & Data Security Summit
Register for the Cloud & Data Security Summit to learn how to utilize tools, controls, and design models needed to properly secure cloud environments. The post Virtual Event Today: 2023 Cloud & Data Security Summit appeared first on SecurityWeek. This…
Two Jira Plugin Vulnerabilities in Attacker Crosshairs
Attackers are exploiting two path traversal vulnerabilities in the Stagil navigation for Jira – Menus & Themes plugin. The post Two Jira Plugin Vulnerabilities in Attacker Crosshairs appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Security Awareness Training Isn’t Working – How Can We Improve It?
Security awareness training isn’t working to the level it needs to. Social engineering, however, is getting better. Why doesn’t awareness training work, and how can we improve it? The post Security Awareness Training Isn’t Working – How Can We Improve…
Chrome 115 Patches 20 Vulnerabilities
Chrome 115 released with patches for 20 vulnerabilities, including 11 reported by external researchers, who earned thousands of dollars in bug bounties. The post Chrome 115 Patches 20 Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Exploitation of New Citrix Zero-Day Likely to Increase, Organizations Warned
Citrix has patched several vulnerabilities, including CVE-2023-3519, a critical remote code execution zero-day that has been exploited in attacks. The post Exploitation of New Citrix Zero-Day Likely to Increase, Organizations Warned appeared first on SecurityWeek. This article has been indexed…
Oracle Releases 508 New Security Patches With July 2023 CPU
Oracle has released 508 new security patches as part of the July 2023 CPU, including more than 70 that address critical vulnerabilities The post Oracle Releases 508 New Security Patches With July 2023 CPU appeared first on SecurityWeek. This article…
US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa
The two foreign companies are being sanctioned for “for trafficking in cyber exploits used to gain access to information systems.” The post US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa appeared first on SecurityWeek. This article has been indexed from…
NSA, CISA Issue Guidance on 5G Network Slicing Security
The NSA and CISA have published guidance on hardening 5G standalone network slices against potential threats. The post NSA, CISA Issue Guidance on 5G Network Slicing Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware
A threat actor’s real identity was uncovered after they infected their own computer with an information stealer. The post Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware appeared first on SecurityWeek. This article has been indexed…
Nigerian Man Sentenced to 8 Years in US Prison for $8 Million BEC Scheme
Olalekan Jacob Ponle, a Nigerian national living in the UAE, was sentenced to 8 years in a US prison for his role in an $8 million BEC scheme. The post Nigerian Man Sentenced to 8 Years in US Prison for…
WordPress Sites Hacked via Critical Vulnerability in WooCommerce Payments Plugin
Attackers have started exploiting CVE-2023-28121, a recent critical vulnerability in the WooCommerce Payments WordPress plugin. The post WordPress Sites Hacked via Critical Vulnerability in WooCommerce Payments Plugin appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
White House Unveils Cybersecurity Labeling Program for Smart Devices
New US cyber program will label smart devices that are considered safer and less vulnerable to attacks. The post White House Unveils Cybersecurity Labeling Program for Smart Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…