2024

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus 2024-12-30 at 18:18 By As always in cybersecurity, hardly a dull day went by in 2024. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus Read More »

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits 2024-12-30 at 15:03 By The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients’ data against potential cyber attacks. The proposal, which seeks to modify

React to this headline:

Loading spinner

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits Read More »

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips 2024-12-30 at 15:03 By Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack

React to this headline:

Loading spinner

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips Read More »

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions 2024-12-30 at 13:51 By News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users,

React to this headline:

Loading spinner

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions Read More »

Attack Surface Management (ASM) in 2025: Key Trends to Watch 

Attack Surface Management (ASM) in 2025: Key Trends to Watch  2024-12-30 at 11:20 By Ashish Khaitan The digital world is evolving at lightning speed, and so are the challenges that come with it. For organizations today, their attack surface—the sum of all potential entry points for a cyberattack—is expanding faster than ever before. From misconfigured

React to this headline:

Loading spinner

Attack Surface Management (ASM) in 2025: Key Trends to Watch  Read More »

A Look at CISA Known Exploited Vulnerabilities in 2024 

A Look at CISA Known Exploited Vulnerabilities in 2024  2024-12-30 at 10:19 By Ashish Khaitan Overview  The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 185 vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog in 2024, as the database grew to 1,238 software and hardware flaws at high risk of cyberattacks.  The agency removed at

React to this headline:

Loading spinner

A Look at CISA Known Exploited Vulnerabilities in 2024  Read More »

The sixth sense of cybersecurity: How AI spots threats before they strike

The sixth sense of cybersecurity: How AI spots threats before they strike 2024-12-30 at 07:47 By Mirko Zorz In this Help Net Security interview, Vineet Chaku, President of Reaktr.ai, discusses how AI is transforming cybersecurity, particularly in anomaly detection and threat identification. Chaku talks about the skills cybersecurity professionals need to collaborate with AI systems

React to this headline:

Loading spinner

The sixth sense of cybersecurity: How AI spots threats before they strike Read More »

Minimizing CISO personal liability through end of year budgeting

Minimizing CISO personal liability through end of year budgeting 2024-12-30 at 07:20 By To minimize the potential risks to their organizations and their own personal well-being, there are a number of steps CISOs should consider taking as they work to prepare for fiscal year 2025. This article is an excerpt from Subscribe to Security Magazine’s

React to this headline:

Loading spinner

Minimizing CISO personal liability through end of year budgeting Read More »

reconFTW: Open-source reconnaissance automation

reconFTW: Open-source reconnaissance automation 2024-12-30 at 07:05 By Help Net Security reconFTW is an open-source tool that simplifies and automates the reconnaissance process, delivering subdomain enumeration, vulnerability assessment, and gathering intelligence about a target. Using various techniques — such as passive and brute-force methods, permutations, certificate transparency analysis, source code scraping, analytics tracking, and DNS

React to this headline:

Loading spinner

reconFTW: Open-source reconnaissance automation Read More »

Machine identities are the next big target for attackers

Machine identities are the next big target for attackers 2024-12-30 at 06:34 By Help Net Security 86% of organizations had a security incident related to their cloud native environment within the last year, according to Venafi. As a result, 53% of organizations had to delay an application launch or slow down production time; 45% suffered

React to this headline:

Loading spinner

Machine identities are the next big target for attackers Read More »

Cybercriminals tighten their grip on organizations

Cybercriminals tighten their grip on organizations 2024-12-30 at 06:06 By Help Net Security Cybercriminals are using a variety of new methods to target organizations across industries. In this article, we examine the most pressing trends and findings from the 2024 surveys on the growing threat of cybercrime. Social engineering scams sweep through financial institutions North

React to this headline:

Loading spinner

Cybercriminals tighten their grip on organizations Read More »

It’s only a matter of time before LLMs jump start supply-chain attacks

It’s only a matter of time before LLMs jump start supply-chain attacks 2024-12-29 at 20:36 By Jessica Lyons ‘The greatest concern is with spear phishing and social engineering’ Interview  Now that criminals have realized there’s no need to train their own LLMs for any nefarious purposes – it’s much cheaper and easier to steal credentials

React to this headline:

Loading spinner

It’s only a matter of time before LLMs jump start supply-chain attacks Read More »

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft 2024-12-29 at 20:16 By A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web

React to this headline:

Loading spinner

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft Read More »

How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise

How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise 2024-12-28 at 14:51 By Jessica Lyons Cut off one head, two more grow back in its place RansomHub, the ransomware collective that emerged earlier this year, quickly gained momentum, outpacing its criminal colleagues and hitting its victims especially hard. The group named and shamed

React to this headline:

Loading spinner

How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise Read More »

Christmas 1984: The last hurrah for 8-bit home computers

Christmas 1984: The last hurrah for 8-bit home computers 2024-12-28 at 11:48 By Richard Speed Saturation point, and Nintendo and Sega, were just around the corner Feature  Remember the excitement of leafing through a catalog for home computer bargains? Or perhaps gazing longingly at festive tech displays in Britain’s WH Smith (or ComputerLand if you

React to this headline:

Loading spinner

Christmas 1984: The last hurrah for 8-bit home computers Read More »

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials 2024-12-28 at 08:45 By A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug

React to this headline:

Loading spinner

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials Read More »

OpenAI plans to ring in the New Year with a for-profit push

OpenAI plans to ring in the New Year with a for-profit push 2024-12-27 at 22:33 By Tobias Mann We have altered the deal, pray we don’t alter it any further Amid growing competition and skyrocketing compute requirements necessary to support the next generation of AI models, OpenAI is shaking up its corporate structure – again.…

React to this headline:

Loading spinner

OpenAI plans to ring in the New Year with a for-profit push Read More »

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign 2024-12-27 at 20:48 By North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing

React to this headline:

Loading spinner

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign Read More »

Microsoft adds another problem to the Windows 11 24H2 naughty list

Microsoft adds another problem to the Windows 11 24H2 naughty list 2024-12-27 at 19:33 By Richard Speed Santa Satya pops one more issue into his sack just in time for Christmas The trickle of known issues with Windows 11 24H2 has continued with a new one just in time for festive season: installed the operating

React to this headline:

Loading spinner

Microsoft adds another problem to the Windows 11 24H2 naughty list Read More »

Disgraced crypto tycoon Do Kwon will finally be extradited to US from Montenegro

Disgraced crypto tycoon Do Kwon will finally be extradited to US from Montenegro 2024-12-27 at 19:18 By Reuters A South Korean national, Kwon is the former CEO of Terraform Labs, the company behind the stablecoin TrraUSD that collapsed in 2022. This article is an excerpt from Latest Technology News and Product Reviews | New York

React to this headline:

Loading spinner

Disgraced crypto tycoon Do Kwon will finally be extradited to US from Montenegro Read More »

Scroll to Top