January 2024

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families 2024-01-12 at 16:17 By As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since early December 2023. “These families allow the threat actors to circumvent authentication and […]

React to this headline:

Loading spinner

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families Read More »

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion 2024-01-12 at 16:17 By The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on the dark web in February 2023 to publish sensitive data of victims who are unwilling to agree to their demands.

React to this headline:

Loading spinner

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion Read More »

Microsoft suggests command line fiddling to get faulty Windows 10 update installed

Microsoft suggests command line fiddling to get faulty Windows 10 update installed 2024-01-12 at 16:03 By Richard Speed Unhelpful error codes, complex fixes … When did Windows turn into Linux? Microsoft sent yet another problematic patch into the wild this week in the form of KB5034441. However, rather than deal with a BitLocker vulnerability, the

React to this headline:

Loading spinner

Microsoft suggests command line fiddling to get faulty Windows 10 update installed Read More »

Disparate systems: The importance of closing the gap

Disparate systems: The importance of closing the gap 2024-01-12 at 16:03 By Are you getting the most out of your security system? This is a question that many security leaders should be asking themselves and their employees. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Disparate systems: The importance of closing the gap Read More »

So, are we going to talk about how GitHub is an absolute boon for malware, or nah?

So, are we going to talk about how GitHub is an absolute boon for malware, or nah? 2024-01-12 at 15:17 By Thomas Claburn Microsoft says it’s doing its best to crack down on crims The popularity of Github has made it too big to block, which is a boon to dissidents ducking government censors but

React to this headline:

Loading spinner

So, are we going to talk about how GitHub is an absolute boon for malware, or nah? Read More »

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR 2024-01-12 at 15:01 By For years, Microsoft has been making significant inroads in the security space, earning number-one rankings from top industry analyst firms  IDC and Forrester for its endpoint and extended detection and response (XDR) security tools. Taking full advantage of these

React to this headline:

Loading spinner

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR Read More »

It’s uncertain where personal technology is heading, but judging from CES, it smells

It’s uncertain where personal technology is heading, but judging from CES, it smells 2024-01-12 at 14:32 By Mark Pesce Our vulture spent a week in Las Vegas for CES 2024 – here are his key takeaways Column  Every January in Las Vegas a few hundred thousand folks gather to learn about the latest innovations from

React to this headline:

Loading spinner

It’s uncertain where personal technology is heading, but judging from CES, it smells Read More »

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise 2024-01-12 at 14:31 By Ionut Arghire Researchers detail a CI/CD attack leading to PyTorch releases compromise via GitHub Actions self-hosted runners. The post New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise Read More »

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure 2024-01-12 at 14:31 By Ionut Arghire Researchers find no direct link between Russian APT Sandworm and last year’s attacks on Denmark’s critical infrastructure. The post Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Russian Hackers Likely Not Involved in Attacks on Denmark’s Critical Infrastructure Read More »

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO 2024-01-12 at 14:31 By Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong shield. Sadly, this image of fortitude remains a pipe dream despite its comforting nature. In the

React to this headline:

Loading spinner

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO Read More »

Data regulator fines HelloFresh £140k for sending 80M+ spams

Data regulator fines HelloFresh £140k for sending 80M+ spams 2024-01-12 at 13:31 By Paul Kunert Messaging menace used text and email to bombard people Food delivery company HelloFresh is nursing a £140,000 ($178k) fine by Britain’s data privacy watchdog after a probe found it had dispatched upwards of a staggering 79 million spam email and

React to this headline:

Loading spinner

Data regulator fines HelloFresh £140k for sending 80M+ spams Read More »

Apple Patches Keystroke Injection Vulnerability in Magic Keyboard

Apple Patches Keystroke Injection Vulnerability in Magic Keyboard 2024-01-12 at 13:16 By Ionut Arghire Apple’s latest Magic Keyboard firmware addresses a recently disclosed Bluetooth keyboard injection vulnerability. The post Apple Patches Keystroke Injection Vulnerability in Magic Keyboard appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Apple Patches Keystroke Injection Vulnerability in Magic Keyboard Read More »

Malware Used in Ivanti Zero-Day Attacks Shows Hackers Preparing for Patch Rollout

Malware Used in Ivanti Zero-Day Attacks Shows Hackers Preparing for Patch Rollout 2024-01-12 at 13:16 By Eduard Kovacs Ivanti zero-day vulnerabilities dubbed ConnectAround could impact thousands of systems and Chinese cyberspies are preparing for patch release. The post Malware Used in Ivanti Zero-Day Attacks Shows Hackers Preparing for Patch Rollout appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Malware Used in Ivanti Zero-Day Attacks Shows Hackers Preparing for Patch Rollout Read More »

What is threat management?

What is threat management? 2024-01-12 at 11:01 By dimpishahcyble What is Threat Management? Threat Management is a comprehensive procedure that identifies, prevents, and responds to cyber threats. A robust threat management process is crucial in minimizing the risk of cyberattacks. By proactively addressing potential threats, organizations can enhance their cybersecurity posture and fortify their defenses

React to this headline:

Loading spinner

What is threat management? Read More »

Behavox Intelligent Archive simplifies operations for the unified tech stack

Behavox Intelligent Archive simplifies operations for the unified tech stack 2024-01-12 at 11:01 By Industry News Behavox launched the Behavox Intelligent Archive. This new offering is WORM (Write Once, Read Many) compliant and seamlessly integrates with the Behavox surveillance product. Developed in partnership with Google Cloud, the Behavox Intelligent Archive offers security, scalability, and access

React to this headline:

Loading spinner

Behavox Intelligent Archive simplifies operations for the unified tech stack Read More »

HackerOne collaborates with Semgrep to streamline code review for modern development

HackerOne collaborates with Semgrep to streamline code review for modern development 2024-01-12 at 10:46 By Industry News HackerOne announced a partnership with code security solution, Semgrep, to combine Semgrep’s automated code security tools with expert support from HackerOne PullRequest code reviewers. Security teams can now analyze code through Semgrep and have PullRequest reviewers validate results

React to this headline:

Loading spinner

HackerOne collaborates with Semgrep to streamline code review for modern development Read More »

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks 2024-01-12 at 10:16 By Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners within targeted environments. “This attack is particularly intriguing due to the attacker’s use of packers and rootkits to conceal the

React to this headline:

Loading spinner

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks Read More »

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign 2024-01-12 at 09:46 By This blog delves into the Phemedrone Stealer campaign’s exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware’s payload. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign Read More »

Drivers: We’ll take that plain dumb car over a flashy data-spilling internet one, thanks

Drivers: We’ll take that plain dumb car over a flashy data-spilling internet one, thanks 2024-01-12 at 09:31 By Jessica Lyons Hardcastle Now that’s a smart move CES  Despite all the buzz around internet-connected smart cars at this year’s CES in Las Vegas, most folks don’t want vehicle manufacturers sharing their personal data with third parties

React to this headline:

Loading spinner

Drivers: We’ll take that plain dumb car over a flashy data-spilling internet one, thanks Read More »

Scroll to Top