CSO Online
Dark Reading
Dark Web Informer
Europol
Krebs on Security
NSA
Reuters
Security Affairs
The Hacker News
Wired
ZDNET
Former CIA analyst pleaded guilty to leaking top-secret documents
Tue Jan 21 2025
A former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024. Asif William Rahman, a former CIA analyst with Top-Secret clearance since 2016, pleaded guilty to leaking classified information on social media in October 2024. Rahman has access to Sensitive Compartmented Information (SCI). On October 17, […]
Security Affairs
New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers
Tue Jan 21 2025
Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called Murdoc Botnet. Murdoc Botnet is a new Mirai botnet variant that targets vulnerabilities in AVTECH IP cameras and Huawei HG532 routers, the Qualys Threat Research Unit reported. The botnet has been active since at least […]
Security Affairs
Trump Frees Silk Road Creator Ross Ulbricht After 11 Years in Prison
Wed Jan 22 2025
Donald Trump pardoned the creator of the world’s first dark-web drug market, who is now a libertarian cause célèbre in some parts of the crypto community.
Wired
Microsoft Teams vishing attacks trick employees into handing over remote access
Tue Jan 21 2025
Attackers believed to be affiliated with ransomware groups have recently been observed using a technique in which they bombard employees with spam emails and then call them on Microsoft Teams posing a
CSO Online
ChatGPT-Lücke ermöglicht DDoS-Attacken
Tue Jan 21 2025
srcset="https://b2b-contenthub.
CSO Online
Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers
Tue Jan 21 2025
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet. The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh...
The Hacker News
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Tue Jan 21 2025
A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This...
The Hacker News
ChatGPT API flaws could allow DDoS, prompt injection attacks
Tue Jan 21 2025
OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of service (DDoS) attacks on unsuspecting targets.
CSO Online
CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests
Tue Jan 21 2025
CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of cyber scams involving threat actors impersonating the agency by sending fraudulent AnyDesk connection requests under the guise of security audits. CERT-UA pointed out that it uses the software AnyDesk […]
Security Affairs
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
Tue Jan 21 2025
A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to...
The Hacker News
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Tue Jan 21 2025
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been identified during testing?" often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest...
The Hacker News
7 top cybersecurity projects for 2025
Tue Jan 21 2025
As 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends.
CSO Online
Experts found multiple flaws in Mercedes-Benz infotainment system
Tue Jan 21 2025
Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation Mercedes-Benz User Experience (MBUX) infotainment system, specifically focusing on the Mercedes-Benz Head Unit. The researchers started from the results of another study conducted by KeenLab on the MBUX internals. The experts used a diagnostic software […]
Security Affairs
EU to take aim at healthcare cyber threat
Tue Jan 21 2025
The European Commission is presenting an action plan to strengthen cybersecurity in healthcare as one of its key priorities in the first 100 days of the commission’s new mandate.
CSO Online
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
Tue Jan 21 2025
Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing...
The Hacker News
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Tue Jan 21 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to...
The Hacker News
HPE is investigating IntelBroker’s claims of the company hack
Mon Jan 20 2025
HPE is probing claims by the threat actor IntelBroker who is offering to sell alleged stolen source code and data from the company. Last week, the notorious threat actor IntelBroker announced on a popular cybercrime forum the sale of data allegedly stolen from HPE. IntelBroker, known for leaking data from major organizations, made the headlines […]
Security Affairs
Esperts found new DoNot Team APT group’s Android malware
Mon Jan 20 2025
Researchers linked the threat actor DoNot Team to a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses on government and military organizations, […]
Security Affairs
So geht Tabletop Exercise
Tue Jan 21 2025
Übung macht den Incident-Response-Meister.
CSO Online
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
Mon Jan 20 2025
New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sender's identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor...
The Hacker News
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
Mon Jan 20 2025
The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the...
The Hacker News
Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets
Mon Jan 20 2025
Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have identified multiple packages in the npm and Python Package Index (PyPI) repository designed to target Solana private keys and drain funds from victims’ wallets. The malicious npm packages allowed the threat actors to exfiltrate Solana […]
Security Affairs
Cyberangriff auf Bundesdruckerei-Tochter
Mon Jan 20 2025
2476561975 TippaPatt – Shutterstock.
CSO Online
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Mon Jan 20 2025
As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can't be fought with...
The Hacker News
HPE’s sensitive data exposed in alleged IntelBroker hack
Mon Jan 20 2025
IntelBroker has struck again.
CSO Online
Product Walkthrough: How Satori Secures Sensitive Data From Production to AI
Mon Jan 20 2025
Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting...
The Hacker News
Ridding your network of NTLM
Mon Jan 20 2025
Microsoft has hinted at a possible end to NTLM a few times, but with quite a few Windows 95 or 98 in use that do not support the alternative, Kerberos, it won’t be an easy job to do.
CSO Online
How organizations can secure their AI code
Mon Jan 20 2025
In 2023, the team at data extraction startup Reworkd was under tight deadlines.
CSO Online
Midsize firms universally behind in slog toward DORA compliance
Mon Jan 20 2025
Beginning Friday, Jan.
CSO Online
Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
Mon Jan 20 2025
Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below - @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing liquidity pool...
The Hacker News
Diese Security-Technologien haben ausgedient
Mon Jan 20 2025
Zeit für eine Frischzellenkur?JL_OFF | shutterstock.
CSO Online
Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution
Mon Jan 20 2025
Critical flaws in WGS-804HPT switches could be chained to gain remote code execution on Planet Technology’s industrial devices. The Planet WGS-804HPT industrial switch is used in building and home automation networks to provide connectivity of Internet of things (IoT) devices, IP surveillance cameras, and wireless LAN network applications. This switch family is equipped with a […]
Security Affairs
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 29
Sun Jan 19 2025
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection Ransomware on ESXi: The mechanization of virtualized attacks FunkSec – Alleged Top Ransomware Group Powered by AI Abusing AWS Native Services: Ransomware Encrypting S3 Buckets […]
Security Affairs
Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION
Sun Jan 19 2025
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon EU privacy […]
Security Affairs
A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks
Sun Jan 19 2025
A WordPress W3 Total Cache plugin vulnerability could allow attackers to access information from internal services, including metadata on cloud-based apps. A severe vulnerability, tracked as CVE-2024-12365 (CVSS score of 8.5) in the WordPress W3 Total Cache plugin could expose metadata from internal services and cloud apps. The WordPress W3 Total Cache plugin is a […]
Security Affairs
U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon
Sat Jan 18 2025
The U.S. Treasury’s OFAC sanctioned a Chinese cybersecurity firm and a Shanghai cyber actor for ties to Salt Typhoon and a federal agency breach. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned Chinese firm Sichuan Juxinhe Network Technology Co., LTD., for its involvement in the activities of the Salt Typhoon APT group, […]
Security Affairs
How to Get Around the US TikTok Ban
Sun Jan 19 2025
TikTok is now unavailable in the United States—and getting around the ban isn’t as simple as using a VPN. Here’s what you need to know.
Wired
TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
Sun Jan 19 2025
Popular video-sharing social network TikTok has officially gone dark in the United States, as a federal ban on the app comes into effect on January 19, 2025. "We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a pop-up message. "We're working to restore our service in the U.S. as soon as possible...
The Hacker News
US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches
Sat Jan 18 2025
Plus: New details emerge about China’s cyber espionage against the US, the FBI remotely uninstalls malware on 4,200 US devices, and victims of the PowerSchool edtech breach reveal what hackers stole.
Wired
U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Salt Typhoon
Sat Jan 18 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including the recent...
The Hacker News
Secure AI? Dream on, says AI red team
Sat Jan 18 2025
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete.
CSO Online
US hits back against China’s Salt Typhoon group
Fri Jan 17 2025
The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider camp
CSO Online
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
Fri Jan 17 2025
noyb files complaints against TikTok, AliExpress, and other Chinese companies for illegal EU user data transfers to China, violating data protection laws. Austrian privacy non-profit group None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully […]
Security Affairs
U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog
Fri Jan 17 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Aviatrix Controllers OS Command Injection vulnerability, tracked as CVE-2024-50603 (CVSS score of 10) to its Known Exploited Vulnerabilities (KEV) catalog. The flaw impacts Aviatrix Controller pre-7.1.4191 and 7.2.x […]
Security Affairs
The FCC’s Jessica Rosenworcel Isn’t Leaving Without a Fight
Fri Jan 17 2025
As the US faces “the worst telecommunications hack in our nation’s history,” by China’s Salt Typhoon hackers, the outgoing FCC chair is determined to bolster network security if it’s the last thing she does.
Wired
DORA-Umsetzung hält Banken-CISOs auf Trab
Fri Jan 17 2025
Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden.
CSO Online
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Fri Jan 17 2025
Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report. "An attacker...
The Hacker News
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems
Fri Jan 17 2025
Researchers detailed a now-patched vulnerability that could allow a bypass of the Secure Boot mechanism in UEFI systems. ESET disclosed details of a now-patched vulnerability, tracked as CVE-2024-7344 (CVSS score: 6.7), that could allow a bypass of the Secure Boot mechanism in UEFI systems. The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface […]
Security Affairs
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
Fri Jan 17 2025
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks...
The Hacker News
Poor patching regime is opening businesses to serious problems
Fri Jan 17 2025
Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a growing number of publicly disclosed vulnerabilities.
CSO Online
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
Fri Jan 17 2025
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,...
The Hacker News
Russia-linked APT Star Blizzard targets WhatsApp accounts
Fri Jan 17 2025
The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “Callisto“, “Seaborgium“, “ColdRiver”, and “TA446,” targeted government officials, military personnel, journalists and […]
Security Affairs
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
Fri Jan 17 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People's Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These...
The Hacker News
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
Fri Jan 17 2025
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting...
The Hacker News
EU’s DORA could further strain cybersecurity skills gap
Fri Jan 17 2025
Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market.
CSO Online
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Fri Jan 17 2025
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data...
The Hacker News
Was ist ein Payload?
Fri Jan 17 2025
Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt lauerten, werden Payloads zum Beispiel in vermeintlich harmlosen Dateianhängen verstec
CSO Online
Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers
Fri Jan 17 2025
There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say Belgian researchers, who warn that, unless action is taken by CISOs and network product manufact
CSO Online
Chinese Innovations Spawn Wave of Toll Phishing Via SMS
Thu Jan 16 2025
Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.
Krebs on Security
Prominent US law firm Wolf Haldenstein disclosed a data breach
Thu Jan 16 2025
The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in […]
Security Affairs
Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants
Fri Jan 17 2025
A breach of AT&T that exposed “nearly all” of the company’s customers may have included records related to confidential FBI sources, potentially explaining the bureau’s new embrace of end-to-end encryption.
Wired
How do you unlock automation within IT security and IT operations?
Thu Jan 16 2025
The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security teams to cost-effectively manage increasingly complex environments.
CSO Online
Biden White House goes all out in final, sweeping cybersecurity order
Thu Jan 16 2025
The Biden administration’s last cybersecurity action is a comprehensive and ambitious 50-page executive order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” which
CSO Online
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches
Thu Jan 16 2025
The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability in Cleo file transfer products. “We have data of many companies who […]
Security Affairs
Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign
Thu Jan 16 2025
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or international relations...
The Hacker News
International agierende Internetbetrüger geschnappt
Thu Jan 16 2025
Insgesamt waren ca.
CSO Online
Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen
Thu Jan 16 2025
srcset="https://b2b-contenthub.
CSO Online
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
Thu Jan 16 2025
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying to juggle chainsaws while riding a unicycle. Traditional trust management? Forget it. It's simply not built for today's fast-paced, hybrid environments. You need a...
The Hacker News
FTC orders GoDaddy to fix its infosec practices
Thu Jan 16 2025
Web-hosting giant GoDaddy has been called out by the US Federal Trade Commission (FTC) for its lax security practices, since at least January 2018, with an order to immediately implement a tighter inf
CSO Online
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
Thu Jan 16 2025
You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester). Stolen credentials on criminal forums cost as...
The Hacker News
Biden's Cyber Ambassador Urges Trump Not to Cede Ground to Russia and China in Global Tech Fight
Thu Jan 16 2025
Nathaniel Fick, the ambassador for cyberspace and digital policy, has led US tech diplomacy amid a rising tide of pressure from authoritarian regimes. Will the Trump administration undo that work?
Wired
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Thu Jan 16 2025
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft's "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate, according to a new...
The Hacker News
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Thu Jan 16 2025
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration. "A simple misconfiguration in on-premise applications can override the Group Policy, effectively negating the Group Policy designed to stop NTLMv1 authentications," Silverfort researcher Dor Segal said in a...
The Hacker News
MikroTik botnet relies on DNS misconfiguration to spread malware
Thu Jan 16 2025
Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]
Security Affairs
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
Thu Jan 16 2025
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads," HP Wolf Security said in its Threat Insights Report...
The Hacker News
GitHub’s Deepfake Porn Crackdown Still Isn’t Working
Thu Jan 16 2025
Over a dozen programs used by creators of nonconsensual explicit images have evaded detection on the developer platform, WIRED has found.
Wired
A New Jam-Packed Biden Executive Order Tackles Cybersecurity, AI, and More
Thu Jan 16 2025
US president Joe Biden just issued a 40-page executive order that aims to bolster federal cybersecurity protections, directs government use of AI—and takes a swipe at Microsoft’s dominance.
Wired
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Thu Jan 16 2025
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named...
The Hacker News
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
Thu Jan 16 2025
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern instances of absolute path traversal that allow a remote...
The Hacker News
SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose
Thu Jan 16 2025
Security information and event management (SIEM) is a blue-collar tool for network security professionals.
CSO Online
Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices
Thu Jan 16 2025
A previously unknown threat actor released config files and VPN passwords for Fortinet FortiGate devices on a popular cybercrime forum. A previously unknown threat actor named Belsen Group published configuration files and VPN passwords for over 15,000 Fortinet FortiGate appliances. “2025 will be a fortunate year for the world. At the beginning of the year, […]
Security Affairs
Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws
Wed Jan 15 2025
Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities, including three actively exploited issues. Microsoft Patch Tuesday security updates for January 2025 addressed 161 vulnerabilities in Windows and Windows Components, Office and Office Components, Hyper-V, SharePoint Server, .NET and Visual Studio, Azure, BitLocker, Remote Desktop Services, and Windows Virtual Trusted Platform Module. 11 […]
Security Affairs
Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed
Thu Jan 16 2025
When people think about starting a new job, words like “exciting,” “motivating,” and “rewarding” often come to mind.
CSO Online
CISA warns second BeyondTrust vulnerability also exploited in the wild
Wed Jan 15 2025
The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December.
CSO Online
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Wed Jan 15 2025
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages," Jérôme Segura, senior director of...
The Hacker News
U.S. CISA adds Fortinet FortiOS flaw to its Known Exploited Vulnerabilities catalog
Wed Jan 15 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Fortinet FortiOS authorization bypass vulnerability, tracked as CVE-2024-55591 (CVSS score: 9.6) to its Known Exploited Vulnerabilities (KEV) catalog. Remote attackers can exploit the vulnerability to bypass authentication and gain […]
Security Affairs
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
Wed Jan 15 2025
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews," Ryan Sherstobitoff, senior vice president of Threat...
The Hacker News
Die Top 10 Geschäftsrisiken in Deutschland 2025
Wed Jan 15 2025
Cyberangriffe zählen nach wie vor zu den größten Geschäftsrisiken.
CSO Online
Perfide Ransomware-Attacke gegen AWS-Nutzer
Wed Jan 15 2025
srcset="https://b2b-contenthub.
CSO Online
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Wed Jan 15 2025
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker...
The Hacker News
Cisco’s homegrown AI to help enterprises navigate AI adoption
Wed Jan 15 2025
As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences.
CSO Online
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Wed Jan 15 2025
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and read/write arbitrary files of any connected client," the CERT Coordination Center (CERT/CC) said in an advisory. "Sensitive data, such as SSH keys,...
The Hacker News
Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket
Wed Jan 15 2025
The ransomware group Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C, Halcyon researchers warn. The ransomware group Codefinger has been spotted using compromised AWS keys to encrypt data in S3 buckets. The threat actor used AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) for encryption, then demanded the payment of […]
Security Affairs
CISA unveils ‘Secure by Demand’ guidelines to bolster OT security
Wed Jan 15 2025
The US Cybersecurity and Infrastructure Security Agency (CISA), along with its international cybersecurity allies, has unveiled the “Secure by Demand” guidelines to safeguard operational technology (O
CSO Online
The High-Stakes Disconnect For ICS/OT Security
Wed Jan 15 2025
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT...
The Hacker News
Diese Unternehmen hat’s schon erwischt
Wed Jan 15 2025
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.
CSO Online
CVE-2024-44243 macOS flaw allows persistent malware installation
Wed Jan 15 2025
Microsoft disclosed details of a vulnerability in Apple macOS that could have allowed an attacker to bypass the OS’s System Integrity Protection (SIP). Microsoft disclosed details of a now-patched macOS flaw, tracked as CVE-2024-44243 (CVSS score: 5.5), that allows attackers with “root” access to bypass System Integrity Protection (SIP). SIP in macOS safeguards the system by […]
Security Affairs
The CFO may be the CISO’s most important business ally
Wed Jan 15 2025
CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities.
CSO Online
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
Wed Jan 15 2025
The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a "multi-month law enforcement operation." PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with the People's Republic of China (PRC...
The Hacker News
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid
Wed Jan 15 2025
Strong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts.
CSO Online