News

Black Friday shoppers targeted with thousands of fraudulent online stores

Black Friday shoppers targeted with thousands of fraudulent online stores 2024-11-26 at 13:33 By Zeljka Zorz Building fake, fraudulent online stores has never been easier: fraudsters are registering domain names for a pittance, using the SHOPYY e-commerce platform to build the websites, and leveraging large language models (LLMs) to rewrite existing product listings to perfect […]

React to this headline:

Loading spinner

Black Friday shoppers targeted with thousands of fraudulent online stores Read More »

RomCom hackers chained Firefox and Windows zero-days to deliver backdoor

RomCom hackers chained Firefox and Windows zero-days to deliver backdoor 2024-11-26 at 12:18 By Zeljka Zorz Russia-aligned APT group RomCom was behind attacks that leveraged CVE-2024-9680, a remote code execution flaw in Firefox, and CVE-2024-49039, an elevation of privilege vulnerability in Windows Task Scheduler, as zero-days earlier this year. “Chaining together two zero-day vulnerabilities armed

React to this headline:

Loading spinner

RomCom hackers chained Firefox and Windows zero-days to deliver backdoor Read More »

How to recognize employment fraud before it becomes a security issue

How to recognize employment fraud before it becomes a security issue 2024-11-26 at 07:39 By Help Net Security The combination of remote work, the latest technologies, and never physically meeting your employees has made it very easy for job applicants to mask their true identities from their employer and commit employment fraud. Motivations for this

React to this headline:

Loading spinner

How to recognize employment fraud before it becomes a security issue Read More »

Practical strategies to build an inclusive culture in cybersecurity

Practical strategies to build an inclusive culture in cybersecurity 2024-11-26 at 07:03 By Mirko Zorz In this Help Net Security interview, Alona Geckler, Chief of Staff, SVP of Business Operations at Acronis, shares her insights on the diversity environment in the cybersecurity and IT industries. She discusses the progress made over the past two decades,

React to this headline:

Loading spinner

Practical strategies to build an inclusive culture in cybersecurity Read More »

Cybersecurity jobs available right now: November 26, 2024

Cybersecurity jobs available right now: November 26, 2024 2024-11-26 at 06:03 By Anamarija Pogorelec Application Security Engineer Agoda | UAE | Hybrid – View job details As an Application Security Engineer, you will develop and design application-level security controls and standards. Perform application security design reviews against new products and services. Track and prioritize all

React to this headline:

Loading spinner

Cybersecurity jobs available right now: November 26, 2024 Read More »

Faraway Russian hackers breached US organization via Wi-Fi

Faraway Russian hackers breached US organization via Wi-Fi 2024-11-25 at 19:03 By Zeljka Zorz Forest Blizzard, a threat group associated with Russia’s GRU military intelligence service, repeatedly breached a US-based organization via compromised computer systems of nearby firms, which they leveraged to authenticate to the target’s enterprise Wi-Fi network. The repeated attacks Volexity, a company

React to this headline:

Loading spinner

Faraway Russian hackers breached US organization via Wi-Fi Read More »

Microsoft asks Windows Insiders to try out the controversial Recall feature

Microsoft asks Windows Insiders to try out the controversial Recall feature 2024-11-25 at 16:33 By Zeljka Zorz Participants of the Windows Insider Program that have a Qualcomm Snapdragon-powered Copilot+ PC can now try out Recall, the infamous snapshot-taking, AI-powered feature that was met with much criticism when it was unveiled earlier this year. “We heard

React to this headline:

Loading spinner

Microsoft asks Windows Insiders to try out the controversial Recall feature Read More »

Wireshark 4.4.2: Security updates, bug fixes, updated protocol support

Wireshark 4.4.2: Security updates, bug fixes, updated protocol support 2024-11-25 at 12:18 By Help Net Security Wireshark, the popular network protocol analyzer, has reached version 4.4.2. It is used for troubleshooting, analysis, development and education. The following vulnerabilities have been fixed: wnpa-sec-2024-14 FiveCo RAP dissector infinite loop. wnpa-sec-2024-15 ECMP dissector crash. Updated protocol support: ARTNET,

React to this headline:

Loading spinner

Wireshark 4.4.2: Security updates, bug fixes, updated protocol support Read More »

AI Kuru, cybersecurity and quantum computing

AI Kuru, cybersecurity and quantum computing 2024-11-25 at 08:13 By Help Net Security As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the day when quantum computers can break current encryption methods). This could compromise the security of digital communications, as well as autonomous control

React to this headline:

Loading spinner

AI Kuru, cybersecurity and quantum computing Read More »

Overcoming legal and organizational challenges in ethical hacking

Overcoming legal and organizational challenges in ethical hacking 2024-11-25 at 07:33 By Mirko Zorz In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security domains. He explains how AI and machine learning enhance ethical hacking by streamlining vulnerability detection

React to this headline:

Loading spinner

Overcoming legal and organizational challenges in ethical hacking Read More »

Deploy a SOC using Kali Linux in AWS

Deploy a SOC using Kali Linux in AWS 2024-11-25 at 07:04 By Mirko Zorz The Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment is ideal for honing skills in security operations, threat detection, incident response, and

React to this headline:

Loading spinner

Deploy a SOC using Kali Linux in AWS Read More »

Week in review: 0-days exploited in Palo Alto Networks firewalls, two unknown Linux backdoors identified

Week in review: 0-days exploited in Palo Alto Networks firewalls, two unknown Linux backdoors identified 2024-11-24 at 11:03 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 2,000 Palo Alto Networks devices compromised in latest attacks Attackers have compromised around 2,000 Palo Alto Networks firewalls

React to this headline:

Loading spinner

Week in review: 0-days exploited in Palo Alto Networks firewalls, two unknown Linux backdoors identified Read More »

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications 2024-11-22 at 11:06 By Industry News SentinelOne announced new AI security posture management (AI-SPM) capabilities to protect and secure the use of AI services in the workplace. Built on SentinelOne’s Singularity cybersecurity platform, the new offering will expand SentinelOne’s top-rated Singularity Cloud Security portfolio to give

React to this headline:

Loading spinner

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications Read More »

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more! 2024-11-22 at 10:01 By Help Net Security The Proxmox Virtual Environment 8.3 enterprise virtualization solution features management tools and a user-friendly web interface, allowing you to deploy open-source solutions in clustered, highly available setups. This version is based on Debian 12.8 (Bookworm), but uses

React to this headline:

Loading spinner

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more! Read More »

The limits of AI-based deepfake detection

The limits of AI-based deepfake detection 2024-11-22 at 08:03 By Mirko Zorz In this Help Net Security interview, Ben Colman, CEO of Reality Defender, discusses the challenges of detecting high-quality deepfakes in real-world applications. He addresses the effectiveness and limitations of watermarking, AI-based detection, and the potential of emerging technologies in securing media authenticity. Colman

React to this headline:

Loading spinner

The limits of AI-based deepfake detection Read More »

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

Deepfake attacks occur every five minutes

Deepfake attacks occur every five minutes 2024-11-22 at 06:35 By Help Net Security As cybercriminals continue to adapt their techniques to find new ways through defenses, AI-assisted fraud is growing increasingly sophisticated and frequent, according to Entrust. The findings reveal a deepfake attack happened every five minutes in 2024, while digital document forgeries increased 244%

React to this headline:

Loading spinner

Deepfake attacks occur every five minutes Read More »

New infosec products of the week: November 22, 2024

New infosec products of the week: November 22, 2024 2024-11-22 at 06:03 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Aon, Arkose Labs, HiddenLayer, Hornetsecurity, Radware, and Tanium. Arkose Device ID detects suspicious activity patterns By adding Arkose Device ID to the Arkose Labs’

React to this headline:

Loading spinner

New infosec products of the week: November 22, 2024 Read More »

US charges five alleged members of Scattered Spider gang

US charges five alleged members of Scattered Spider gang 2024-11-21 at 18:03 By Help Net Security Law enforcement unsealed criminal charges against five alleged members of Scattered Spider, who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee credentials to log in and steal non-public company data and

React to this headline:

Loading spinner

US charges five alleged members of Scattered Spider gang Read More »

Active network of North Korean IT front companies exposed

Active network of North Korean IT front companies exposed 2024-11-21 at 16:18 By Zeljka Zorz An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active network of such companies originating in China. Unearthing North Korean IT front

React to this headline:

Loading spinner

Active network of North Korean IT front companies exposed Read More »

Scroll to Top