CSO Online

Dark Reading

Dark Web Informer

Europol

Krebs on Security

NSA

Reuters

Security Affairs

The Hacker News

Wired

ZDNET

Former CIA analyst pleaded guilty to leaking top-secret documents

Tue Jan 21 2025

A former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024. Asif William Rahman, a former CIA analyst with Top-Secret clearance since 2016, pleaded guilty to leaking classified information on social media in October 2024. Rahman has access to Sensitive Compartmented Information (SCI). On October 17, […]

Security Affairs

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

Tue Jan 21 2025

Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called Murdoc Botnet. Murdoc Botnet is a new Mirai botnet variant that targets vulnerabilities in AVTECH IP cameras and Huawei HG532 routers, the Qualys Threat Research Unit reported. The botnet has been active since at least […]

Security Affairs

Trump Frees Silk Road Creator Ross Ulbricht After 11 Years in Prison

Wed Jan 22 2025

Donald Trump pardoned the creator of the world’s first dark-web drug market, who is now a libertarian cause célèbre in some parts of the crypto community.

Wired

Microsoft Teams vishing attacks trick employees into handing over remote access

Tue Jan 21 2025

Attackers believed to be affiliated with ransomware groups have recently been observed using a technique in which they bombard employees with spam emails and then call them on Microsoft Teams posing a

CSO Online

ChatGPT-Lücke ermöglicht DDoS-Attacken

Tue Jan 21 2025

srcset="https://b2b-contenthub.

CSO Online

Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers

Tue Jan 21 2025

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet. The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh...

The Hacker News

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

Tue Jan 21 2025

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This...

The Hacker News

ChatGPT API flaws could allow DDoS, prompt injection attacks

Tue Jan 21 2025

OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of service (DDoS) attacks on unsuspecting targets.

CSO Online

CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests

Tue Jan 21 2025

CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of cyber scams involving threat actors impersonating the agency by sending fraudulent AnyDesk connection requests under the guise of security audits. CERT-UA pointed out that it uses the software AnyDesk […]

Security Affairs

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

Tue Jan 21 2025

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to...

The Hacker News

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

Tue Jan 21 2025

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been identified during testing?" often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest...

The Hacker News

7 top cybersecurity projects for 2025

Tue Jan 21 2025

As 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends.

CSO Online

Experts found multiple flaws in Mercedes-Benz infotainment system

Tue Jan 21 2025

Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation Mercedes-Benz User Experience (MBUX) infotainment system, specifically focusing on the Mercedes-Benz Head Unit. The researchers started from the results of another study conducted by KeenLab on the MBUX internals. The experts used a diagnostic software […]

Security Affairs

EU to take aim at healthcare cyber threat

Tue Jan 21 2025

The European Commission is presenting an action plan to strengthen cybersecurity in healthcare as one of its key priorities in the first 100 days of the commission’s new mandate.

CSO Online

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Tue Jan 21 2025

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing...

The Hacker News

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

Tue Jan 21 2025

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to...

The Hacker News

HPE is investigating IntelBroker’s claims of the company hack

Mon Jan 20 2025

HPE is probing claims by the threat actor IntelBroker who is offering to sell alleged stolen source code and data from the company. Last week, the notorious threat actor IntelBroker announced on a popular cybercrime forum the sale of data allegedly stolen from HPE. IntelBroker, known for leaking data from major organizations, made the headlines […]

Security Affairs

Esperts found new DoNot Team APT group’s Android malware

Mon Jan 20 2025

Researchers linked the threat actor DoNot Team to a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses on government and military organizations, […]

Security Affairs

So geht Tabletop Exercise

Tue Jan 21 2025

Übung macht den Incident-Response-Meister.

CSO Online

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

Mon Jan 20 2025

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sender's identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor...

The Hacker News

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

Mon Jan 20 2025

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the...

The Hacker News

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Mon Jan 20 2025

Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have identified multiple packages in the npm and Python Package Index (PyPI) repository designed to target Solana private keys and drain funds from victims’ wallets. The malicious npm packages allowed the threat actors to exfiltrate Solana […]

Security Affairs

Cyberangriff auf Bundesdruckerei-Tochter

Mon Jan 20 2025

2476561975 TippaPatt – Shutterstock.

CSO Online

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

Mon Jan 20 2025

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can't be fought with...

The Hacker News

HPE’s sensitive data exposed in alleged IntelBroker hack

Mon Jan 20 2025

IntelBroker has struck again.

CSO Online

Product Walkthrough: How Satori Secures Sensitive Data From Production to AI

Mon Jan 20 2025

Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting...

The Hacker News

Ridding your network of NTLM

Mon Jan 20 2025

Microsoft has hinted at a possible end to NTLM a few times, but with quite a few Windows 95 or 98 in use that do not support the alternative, Kerberos, it won’t be an easy job to do.

CSO Online

How organizations can secure their AI code

Mon Jan 20 2025

In 2023, the team at data extraction startup Reworkd was under tight deadlines.

CSO Online

Midsize firms universally behind in slog toward DORA compliance

Mon Jan 20 2025

Beginning Friday, Jan.

CSO Online

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

Mon Jan 20 2025

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below - @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing liquidity pool...

The Hacker News

Diese Security-Technologien haben ausgedient

Mon Jan 20 2025

Zeit für eine Frischzellenkur?JL_OFF | shutterstock.

CSO Online

Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution

Mon Jan 20 2025

Critical flaws in WGS-804HPT switches could be chained to gain remote code execution on Planet Technology’s industrial devices. The Planet WGS-804HPT industrial switch is used in building and home automation networks to provide connectivity of Internet of things (IoT) devices, IP surveillance cameras, and wireless LAN network applications. This switch family is equipped with a […]

Security Affairs

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 29

Sun Jan 19 2025

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection Ransomware on ESXi: The mechanization of virtualized attacks FunkSec – Alleged Top Ransomware Group Powered by AI Abusing AWS Native Services: Ransomware Encrypting S3 Buckets […]

Security Affairs

Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION

Sun Jan 19 2025

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon EU privacy […]

Security Affairs

A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks

Sun Jan 19 2025

A WordPress W3 Total Cache plugin vulnerability could allow attackers to access information from internal services, including metadata on cloud-based apps. A severe vulnerability, tracked as CVE-2024-12365 (CVSS score of 8.5) in the WordPress W3 Total Cache plugin could expose metadata from internal services and cloud apps. The WordPress W3 Total Cache plugin is a […]

Security Affairs

U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon

Sat Jan 18 2025

The U.S. Treasury’s OFAC sanctioned a Chinese cybersecurity firm and a Shanghai cyber actor for ties to Salt Typhoon and a federal agency breach. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned Chinese firm Sichuan Juxinhe Network Technology Co., LTD., for its involvement in the activities of the Salt Typhoon APT group, […]

Security Affairs

How to Get Around the US TikTok Ban

Sun Jan 19 2025

TikTok is now unavailable in the United States—and getting around the ban isn’t as simple as using a VPN. Here’s what you need to know.

Wired

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025

Sun Jan 19 2025

Popular video-sharing social network TikTok has officially gone dark in the United States, as a federal ban on the app comes into effect on January 19, 2025. "We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a pop-up message. "We're working to restore our service in the U.S. as soon as possible...

The Hacker News

US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches

Sat Jan 18 2025

Plus: New details emerge about China’s cyber espionage against the US, the FBI remotely uninstalls malware on 4,200 US devices, and victims of the PowerSchool edtech breach reveal what hackers stole.

Wired

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Salt Typhoon

Sat Jan 18 2025

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including the recent...

The Hacker News

Secure AI? Dream on, says AI red team

Sat Jan 18 2025

The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete.

CSO Online

US hits back against China’s Salt Typhoon group

Fri Jan 17 2025

The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider camp

CSO Online

EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies

Fri Jan 17 2025

noyb files complaints against TikTok, AliExpress, and other Chinese companies for illegal EU user data transfers to China, violating data protection laws. Austrian privacy non-profit group None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully […]

Security Affairs

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog

Fri Jan 17 2025

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Aviatrix Controllers OS Command Injection vulnerability, tracked as CVE-2024-50603 (CVSS score of 10) to its Known Exploited Vulnerabilities (KEV) catalog. The flaw impacts Aviatrix Controller pre-7.1.4191 and 7.2.x […]

Security Affairs

The FCC’s Jessica Rosenworcel Isn’t Leaving Without a Fight

Fri Jan 17 2025

As the US faces “the worst telecommunications hack in our nation’s history,” by China’s Salt Typhoon hackers, the outgoing FCC chair is determined to bolster network security if it’s the last thing she does.

Wired

DORA-Umsetzung hält Banken-CISOs auf Trab

Fri Jan 17 2025

Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden.

CSO Online

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

Fri Jan 17 2025

Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report. "An attacker...

The Hacker News

ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems

Fri Jan 17 2025

Researchers detailed a now-patched vulnerability that could allow a bypass of the Secure Boot mechanism in UEFI systems. ESET disclosed details of a now-patched vulnerability, tracked as CVE-2024-7344 (CVSS score: 6.7), that could allow a bypass of the Secure Boot mechanism in UEFI systems. The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface […]

Security Affairs

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

Fri Jan 17 2025

Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks...

The Hacker News

Poor patching regime is opening businesses to serious problems

Fri Jan 17 2025

Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a growing number of publicly disclosed vulnerabilities.

CSO Online

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

Fri Jan 17 2025

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,...

The Hacker News

Russia-linked APT Star Blizzard targets WhatsApp accounts

Fri Jan 17 2025

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “Callisto“, “Seaborgium“, “ColdRiver”, and “TA446,” targeted government officials, military personnel, journalists and […]

Security Affairs

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

Fri Jan 17 2025

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People's Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These...

The Hacker News

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Fri Jan 17 2025

Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting...

The Hacker News

EU’s DORA could further strain cybersecurity skills gap

Fri Jan 17 2025

Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market.

CSO Online

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

Fri Jan 17 2025

Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data...

The Hacker News

Was ist ein Payload?

Fri Jan 17 2025

Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt lauerten, werden Payloads zum Beispiel in vermeintlich harmlosen Dateianhängen verstec

CSO Online

Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers

Fri Jan 17 2025

There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say Belgian researchers, who warn that, unless action is taken by CISOs and network product manufact

CSO Online

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Thu Jan 16 2025

Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.

Krebs on Security

Prominent US law firm Wolf Haldenstein disclosed a data breach

Thu Jan 16 2025

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in […]

Security Affairs

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

Fri Jan 17 2025

A breach of AT&T that exposed “nearly all” of the company’s customers may have included records related to confidential FBI sources, potentially explaining the bureau’s new embrace of end-to-end encryption.

Wired

How do you unlock automation within IT security and IT operations?

Thu Jan 16 2025

The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security teams to cost-effectively manage increasingly complex environments.

CSO Online

Biden White House goes all out in final, sweeping cybersecurity order

Thu Jan 16 2025

The Biden administration’s last cybersecurity action is a comprehensive and ambitious 50-page executive order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” which

CSO Online

Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

Thu Jan 16 2025

The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability ​​in Cleo file transfer products.  “We have data of many companies who […]

Security Affairs

Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign

Thu Jan 16 2025

The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or international relations...

The Hacker News

International agierende Internetbetrüger geschnappt

Thu Jan 16 2025

Insgesamt waren ca.

CSO Online

Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen

Thu Jan 16 2025

srcset="https://b2b-contenthub.

CSO Online

Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action

Thu Jan 16 2025

The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying to juggle chainsaws while riding a unicycle. Traditional trust management? Forget it. It's simply not built for today's fast-paced, hybrid environments. You need a...

The Hacker News

FTC orders GoDaddy to fix its infosec practices

Thu Jan 16 2025

Web-hosting giant GoDaddy has been called out by the US Federal Trade Commission (FTC) for its lax security practices, since at least January 2018, with an order to immediately implement a tighter inf

CSO Online

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

Thu Jan 16 2025

You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester).  Stolen credentials on criminal forums cost as...

The Hacker News

Biden's Cyber Ambassador Urges Trump Not to Cede Ground to Russia and China in Global Tech Fight

Thu Jan 16 2025

Nathaniel Fick, the ambassador for cyberspace and digital policy, has led US tech diplomacy amid a rising tide of pressure from authoritarian regimes. Will the Trump administration undo that work?

Wired

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

Thu Jan 16 2025

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft's "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate, according to a new...

The Hacker News

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

Thu Jan 16 2025

Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration. "A simple misconfiguration in on-premise applications can override the Group Policy, effectively negating the Group Policy designed to stop NTLMv1 authentications," Silverfort researcher Dor Segal said in a...

The Hacker News

MikroTik botnet relies on DNS misconfiguration to spread malware

Thu Jan 16 2025

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]

Security Affairs

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

Thu Jan 16 2025

Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads," HP Wolf Security said in its Threat Insights Report...

The Hacker News

GitHub’s Deepfake Porn Crackdown Still Isn’t Working

Thu Jan 16 2025

Over a dozen programs used by creators of nonconsensual explicit images have evaded detection on the developer platform, WIRED has found.

Wired

A New Jam-Packed Biden Executive Order Tackles Cybersecurity, AI, and More

Thu Jan 16 2025

US president Joe Biden just issued a 40-page executive order that aims to bolster federal cybersecurity protections, directs government use of AI—and takes a swipe at Microsoft’s dominance.

Wired

Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

Thu Jan 16 2025

Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named...

The Hacker News

Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

Thu Jan 16 2025

Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern instances of absolute path traversal that allow a remote...

The Hacker News

SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose

Thu Jan 16 2025

Security information and event management (SIEM) is a blue-collar tool for network security professionals.

CSO Online

Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices

Thu Jan 16 2025

A previously unknown threat actor released config files and VPN passwords for Fortinet FortiGate devices on a popular cybercrime forum. A previously unknown threat actor named Belsen Group published configuration files and VPN passwords for over 15,000 Fortinet FortiGate appliances. “2025 will be a fortunate year for the world. At the beginning of the year, […]

Security Affairs

Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws

Wed Jan 15 2025

Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities, including three actively exploited issues. Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities in Windows and Windows Components, Office and Office Components, Hyper-V, SharePoint Server, .NET and Visual Studio, Azure, BitLocker, Remote Desktop Services, and Windows Virtual Trusted Platform Module. 11 […]

Security Affairs

Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed

Thu Jan 16 2025

When people think about starting a new job, words like “exciting,” “motivating,” and “rewarding” often come to mind.

CSO Online

CISA warns second BeyondTrust vulnerability also exploited in the wild

Wed Jan 15 2025

The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December.

CSO Online

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

Wed Jan 15 2025

Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages," Jérôme Segura, senior director of...

The Hacker News

U.S. CISA adds Fortinet FortiOS flaw to its Known Exploited Vulnerabilities catalog

Wed Jan 15 2025

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Fortinet FortiOS authorization bypass vulnerability, tracked as CVE-2024-55591 (CVSS score: 9.6) to its Known Exploited Vulnerabilities (KEV) catalog. Remote attackers can exploit the vulnerability to bypass authentication and gain […]

Security Affairs

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

Wed Jan 15 2025

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews," Ryan Sherstobitoff, senior vice president of Threat...

The Hacker News

Die Top 10 Geschäftsrisiken in Deutschland 2025

Wed Jan 15 2025

Cyberangriffe zählen nach wie vor zu den größten Geschäftsrisiken.

CSO Online

Perfide Ransomware-Attacke gegen AWS-Nutzer

Wed Jan 15 2025

srcset="https://b2b-contenthub.

CSO Online

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains

Wed Jan 15 2025

Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker...

The Hacker News

Cisco’s homegrown AI to help enterprises navigate AI adoption

Wed Jan 15 2025

As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences.

CSO Online

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

Wed Jan 15 2025

As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and read/write arbitrary files of any connected client," the CERT Coordination Center (CERT/CC) said in an advisory. "Sensitive data, such as SSH keys,...

The Hacker News

Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket

Wed Jan 15 2025

The ransomware group Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C, Halcyon researchers warn. The ransomware group Codefinger has been spotted using compromised AWS keys to encrypt data in S3 buckets. The threat actor used AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) for encryption, then demanded the payment of […]

Security Affairs

CISA unveils ‘Secure by Demand’ guidelines to bolster OT security

Wed Jan 15 2025

The US Cybersecurity and Infrastructure Security Agency (CISA), along with its international cybersecurity allies, has unveiled the “Secure by Demand” guidelines to safeguard operational technology (O

CSO Online

The High-Stakes Disconnect For ICS/OT Security

Wed Jan 15 2025

Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT...

The Hacker News

Diese Unternehmen hat’s schon erwischt

Wed Jan 15 2025

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.

CSO Online

CVE-2024-44243 macOS flaw allows persistent malware installation

Wed Jan 15 2025

Microsoft disclosed details of a vulnerability in Apple macOS that could have allowed an attacker to bypass the OS’s System Integrity Protection (SIP). Microsoft disclosed details of a now-patched macOS flaw, tracked as CVE-2024-44243 (CVSS score: 5.5), that allows attackers with “root” access to bypass System Integrity Protection (SIP). SIP in macOS safeguards the system by […]

Security Affairs

The CFO may be the CISO’s most important business ally

Wed Jan 15 2025

CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities.

CSO Online

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

Wed Jan 15 2025

The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a "multi-month law enforcement operation." PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with the People's Republic of China (PRC...

The Hacker News

Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid

Wed Jan 15 2025

Strong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts.

CSO Online