July 2023

BT hires chartered management accountant and telco veteran as next CEO

BT hires chartered management accountant and telco veteran as next CEO 31/07/2023 at 14:03 By Paul Kunert Got to keep up with those FTTP builds and the tens of thousands of staff that will leave BT, the former state owned telecommunications monopoly that is building Britain’s fiber backbone, has confirmed current Telia Company president and

React to this headline:

Loading spinner

BT hires chartered management accountant and telco veteran as next CEO Read More »

Web browsing is the primary entry vector for ransomware infections

Web browsing is the primary entry vector for ransomware infections 31/07/2023 at 13:47 By Zeljka Zorz The most widely used method for ransomware delivery in 2022 was via URL or web browsing (75.5%), Palo Alto Networks researchers have found. In 2021, it was email attachments (i.e., delivery via SMTP, POP3, and IMAP protocols), but in

React to this headline:

Loading spinner

Web browsing is the primary entry vector for ransomware infections Read More »

New persistent backdoor used in attacks on Barracuda ESG appliances

New persistent backdoor used in attacks on Barracuda ESG appliances 31/07/2023 at 13:32 By Helga Labus The Cybersecurity and Infrastructure Agency (CISA) has published an analysis report on the backdoors dropped by attackers exploiting CVE-2023-2868, a remote command injection vulnerability in Barracuda Email Security Gateway (ESG) appliances. Barracuda ESG zero-day exploit and backdoors In late

React to this headline:

Loading spinner

New persistent backdoor used in attacks on Barracuda ESG appliances Read More »

Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks

Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks 31/07/2023 at 13:31 By Eduard Kovacs Ivanti EPMM customers have been warned of CVE-2023-35081, a second zero-day vulnerability that has been exploited in targeted attacks. The post Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks Read More »

CISA Analyzes Malware Used in Barracuda ESG Attacks

CISA Analyzes Malware Used in Barracuda ESG Attacks 31/07/2023 at 13:31 By Ionut Arghire CISA has shared analysis reports on three malware families obtained from an organization hacked via a recent Barracuda ESG vulnerability. The post CISA Analyzes Malware Used in Barracuda ESG Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

CISA Analyzes Malware Used in Barracuda ESG Attacks Read More »

AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service

AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service 31/07/2023 at 13:02 By More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office (SOHO) routers as part of a multi-year campaign active since at least May 2021. AVRecon was first disclosed by Lumen Black Lotus Labs earlier

React to this headline:

Loading spinner

AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service Read More »

Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT

Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT 31/07/2023 at 13:02 By Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware called Fruity with the goal of installing remote trojans tools like Remcos RAT. “Among the software in question are various instruments for

React to this headline:

Loading spinner

Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT Read More »

Satnav for the Moon could benefit from Fibonacci’s expertise

Satnav for the Moon could benefit from Fibonacci’s expertise 31/07/2023 at 12:48 By Dan Robinson Middle Ages maths to the rescue Future satellite navigation systems intended for Earth’s Moon may be aided by a model of it developed with methods that go back to mathematician Fibonacci, who lived 800 years ago.… This article is an

React to this headline:

Loading spinner

Satnav for the Moon could benefit from Fibonacci’s expertise Read More »

What would sustainable security even look like?

What would sustainable security even look like? 31/07/2023 at 11:34 By Rupert Goodwins Clue: Nothing like what’s on offer today Opinion  “There seems to be something wrong with our bloody ships today,” fumed Admiral David Beatty during 1916’s Battle of Jutland. Fair enough: three of the Royal Navy’s finest vessels had just blown up and

React to this headline:

Loading spinner

What would sustainable security even look like? Read More »

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable 31/07/2023 at 11:17 By Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors to escalate privileges and steal sensitive data. The flaws, tracked as CVE-2023-37979, CVE-2023-38386, and CVE-2023-38393, impact versions 3.6.25 and below,

React to this headline:

Loading spinner

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable Read More »

Stremio vulnerability exposes millions to RCE and data theft

Stremio vulnerability exposes millions to RCE and data theft 31/07/2023 at 11:02 By Help Net Security CyFox has recently identified a critical hijacking vulnerability in Stremio 4.4, a popular software platform for streaming movies and TV shows. With over 5 million users relying on Stremio for their entertainment needs, this vulnerability poses a significant risk

React to this headline:

Loading spinner

Stremio vulnerability exposes millions to RCE and data theft Read More »

Avaya reseller pleads guilty to role in $88m licensing scam

Avaya reseller pleads guilty to role in $88m licensing scam 31/07/2023 at 10:02 By Simon Sharwood Comms vendor’s employee allegedly generated bogus licences and hijacked sysadmin accounts to make more A New Jersey man has plead guilty to selling pirated Avaya software licenses, allegedly generated and shopped by one of the vendor’s system administrators.… This

React to this headline:

Loading spinner

Avaya reseller pleads guilty to role in $88m licensing scam Read More »

NASA mistakenly severs communication to Voyager 2

NASA mistakenly severs communication to Voyager 2 31/07/2023 at 09:03 By Laura Dobberstein Thankfully the probe can phone home to fix this sort of mess NASA revealed on Friday that its venerable Voyager 2 probe is currently incommunicado, because the space agency pointed its antenna in the wrong direction.… This article is an excerpt from

React to this headline:

Loading spinner

NASA mistakenly severs communication to Voyager 2 Read More »

‘Weird numerological coincidence’ found during work on Linux kernel 6.5

‘Weird numerological coincidence’ found during work on Linux kernel 6.5 31/07/2023 at 08:02 By Simon Sharwood It might be the only non-boring thing about the release, which has Linus Torvalds celebrating Linus Torvalds has noticed a “weird numerological coincidence” during work on version 6.5 of the Linux kernel.… This article is an excerpt from The

React to this headline:

Loading spinner

‘Weird numerological coincidence’ found during work on Linux kernel 6.5 Read More »

How the best CISOs leverage people and technology to become superstars

How the best CISOs leverage people and technology to become superstars 31/07/2023 at 07:47 By Help Net Security What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t give in to despair. Instead, they use their

React to this headline:

Loading spinner

How the best CISOs leverage people and technology to become superstars Read More »

Data privacy vault: Securing sensitive data while navigating regulatory demands

Data privacy vault: Securing sensitive data while navigating regulatory demands 31/07/2023 at 07:32 By Help Net Security In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive customer data. He emphasizes how a data privacy vault can reinforce customer trust by offering

React to this headline:

Loading spinner

Data privacy vault: Securing sensitive data while navigating regulatory demands Read More »

Relying on CVSS alone is risky for vulnerability management

Relying on CVSS alone is risky for vulnerability management 31/07/2023 at 07:05 By Help Net Security A vulnerability management strategy that relies solely on CVSS for vulnerability prioritization is proving to be insufficient at best, according to Rezilion. In fact, relying solely on a CVSS severity score to assess the risk of individual vulnerabilities was

React to this headline:

Loading spinner

Relying on CVSS alone is risky for vulnerability management Read More »

Open-source security challenges and complexities

Open-source security challenges and complexities 31/07/2023 at 06:31 By Help Net Security Open source refers to software or technology that is made available to the public with its source code openly accessible, editable, and distributable. In other words, the source code contains the underlying programming instructions and is freely available for anyone to view, modify,

React to this headline:

Loading spinner

Open-source security challenges and complexities Read More »

Scroll to Top