Don’t miss

Subdominator: Open-source tool for detecting subdomain takeovers

Subdominator: Open-source tool for detecting subdomain takeovers 20/12/2023 at 07:01 By Mirko Zorz Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their […]

React to this headline:

Loading spinner

Subdominator: Open-source tool for detecting subdomain takeovers Read More »

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims 19/12/2023 at 19:04 By Zeljka Zorz The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI develops ALPHV/Blackcat decryptor Over the past 18 months, ALPHV/Blackcat has emerged as the

React to this headline:

Loading spinner

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims Read More »

Wiz and Apiiro partner to provide context-driven security from code to cloud

Wiz and Apiiro partner to provide context-driven security from code to cloud 19/12/2023 at 17:03 By Mirko Zorz Apiiro, a leading application security posture management (ASPM) solution, today announced its partnership with Wiz, the leading cloud security company and Cloud Native Application Protection Platform (CNAPP) provider. By joining Wiz Integrations (WIN), Apiiro brings the power

React to this headline:

Loading spinner

Wiz and Apiiro partner to provide context-driven security from code to cloud Read More »

Mr. Cooper breach exposes sensitive info of over 14 million customers

Mr. Cooper breach exposes sensitive info of over 14 million customers 19/12/2023 at 13:47 By Helga Labus Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On October 31, 2023, Mr. Cooper detected suspicious activity in certain network systems,”

React to this headline:

Loading spinner

Mr. Cooper breach exposes sensitive info of over 14 million customers Read More »

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795) 19/12/2023 at 13:18 By Zeljka Zorz Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection’s security by truncating the extension negotiation message. The Terrapin attack Terrapin is a prefix truncation attack targeting the SSH protocol.

React to this headline:

Loading spinner

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795) Read More »

The impact of prompt injection in LLM agents

The impact of prompt injection in LLM agents 19/12/2023 at 08:31 By Help Net Security Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are turned into agents that interact directly with the external world, utilizing tools to fetch

React to this headline:

Loading spinner

The impact of prompt injection in LLM agents Read More »

EMBA: Open-source security analyzer for embedded devices

EMBA: Open-source security analyzer for embedded devices 19/12/2023 at 08:02 By Mirko Zorz The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups. It assists throughout the security evaluation procedure, extracting firmware, conducting static and dynamic analysis through emulation, and creating a web-based report. EMBA

React to this headline:

Loading spinner

EMBA: Open-source security analyzer for embedded devices Read More »

Ransomware trends and recovery strategies companies should know

Ransomware trends and recovery strategies companies should know 19/12/2023 at 07:34 By Help Net Security Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in software or operating systems. Cybercriminals often target organizations with weak

React to this headline:

Loading spinner

Ransomware trends and recovery strategies companies should know Read More »

Microsoft is working on a more secure print system for Windows

Microsoft is working on a more secure print system for Windows 18/12/2023 at 17:01 By Helga Labus After announcing a gradual elimination of third-party printer drivers on Windows earlier this year, Microsoft has now unveiled its plan for enhancing security by introducting Windows Protected Print Mode (WPP). The problem with the current Windows print system

React to this headline:

Loading spinner

Microsoft is working on a more secure print system for Windows Read More »

Qakbot returns in fresh assault on hospitality sector

Qakbot returns in fresh assault on hospitality sector 18/12/2023 at 15:47 By Helga Labus The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakbot and its

React to this headline:

Loading spinner

Qakbot returns in fresh assault on hospitality sector Read More »

MongoDB corporate systems breached, customer data exposed

MongoDB corporate systems breached, customer data exposed 18/12/2023 at 13:31 By Helga Labus Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach “We detected suspicious activity on Wednesday (Dec. 13th, 2023) evening US Eastern Standard Time, immediately activated

React to this headline:

Loading spinner

MongoDB corporate systems breached, customer data exposed Read More »

Correct bad network behavior to bolster application experience

Correct bad network behavior to bolster application experience 18/12/2023 at 08:31 By Help Net Security Legacy hardware-based applications existed happily in isolation, untethered from a network. The thing that really mattered was the speed of the hard drive and having enough memory. Today, even the software running from personal hard drives relies on other applications

React to this headline:

Loading spinner

Correct bad network behavior to bolster application experience Read More »

Creating a formula for effective vulnerability prioritization

Creating a formula for effective vulnerability prioritization 18/12/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset inventories, and manual methods, while also exploring the role

React to this headline:

Loading spinner

Creating a formula for effective vulnerability prioritization Read More »

Fortifying cyber defenses: A proactive approach to ransomware resilience

Fortifying cyber defenses: A proactive approach to ransomware resilience 15/12/2023 at 08:02 By Help Net Security Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the immediate and tangible impact

React to this headline:

Loading spinner

Fortifying cyber defenses: A proactive approach to ransomware resilience Read More »

Russian hackers target unpatched JetBrains TeamCity servers

Russian hackers target unpatched JetBrains TeamCity servers 14/12/2023 at 16:04 By Helga Labus Russian state-sponsored hackers have been exploiting CVE-2023-42793 to target unpatched, internet-facing JetBrains TeamCity servers since September 2023, US, UK and Polish cybersecurity and law enforcement authorities have warned. The targets APT 29 (aka CozyBear, aka Midnight Blizzard), believed to be associated with

React to this headline:

Loading spinner

Russian hackers target unpatched JetBrains TeamCity servers Read More »

Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164)

Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164) 14/12/2023 at 13:32 By Zeljka Zorz Attackers are trying to leverage public proof-of-exploit (PoC) exploit code for CVE-2023-50164, the recently patched path traversal vulnerability in Apache Struts 2. “Attackers aim to deploy webshells, with some cases targeting the parameter ‘fileFileName’ – a deviation from the original

React to this headline:

Loading spinner

Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164) Read More »

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted 14/12/2023 at 12:19 By Help Net Security Microsoft disrupted an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and consumers globally out of millions of dollars. Images of Storm-1152’s illicit websites. Source: Microsoft Cybercrime-as-a-service is

React to this headline:

Loading spinner

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted Read More »

Digital ops and ops management security predictions for 2024

Digital ops and ops management security predictions for 2024 14/12/2023 at 08:32 By Help Net Security CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding the security of emerging tech like generative AI, organizations will prioritize

React to this headline:

Loading spinner

Digital ops and ops management security predictions for 2024 Read More »

Staying ahead in 2024 with top cybersecurity predictions

Staying ahead in 2024 with top cybersecurity predictions 14/12/2023 at 08:02 By Help Net Security What will 2024 hold for the cybersecurity landscape? In this Help Net Security video, Steve Cobb, CISO at SecurityScorecard, offers his take on what professionals can expect next year. The post Staying ahead in 2024 with top cybersecurity predictions appeared

React to this headline:

Loading spinner

Staying ahead in 2024 with top cybersecurity predictions Read More »

Scroll to Top