News

New twist on ZeroFont phishing technique spotted in the wild

New twist on ZeroFont phishing technique spotted in the wild 27/09/2023 at 15:47 By Helga Labus Cybercriminals are leveraging the ZeroFont technique to trick users into trusting phishing emails, SANS ISC handler Jan Kopriva has warned. The ZeroFont phishing attack Documented and named by Avanan in 2018, the ZeroFont technique involves using text written in […]

React to this headline:

Loading spinner

New twist on ZeroFont phishing technique spotted in the wild Read More »

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129) 27/09/2023 at 14:46 By Zeljka Zorz The Chrome zero-day exploited in the wild and patched by Google a few weeks ago has a new ID (CVE-2023-5129) and a description that tells the whole story: the vulnerability is not in Chrome, but the libwebp library,

React to this headline:

Loading spinner

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129) Read More »

Fake Bitwarden installation packages delivered RAT to Windows users

Fake Bitwarden installation packages delivered RAT to Windows users 27/09/2023 at 11:47 By Helga Labus Windows users looking to install the Bitwarden password manager may have inadvertently installed a remote access trojan (RAT). The ZenRAT malware A malicious website spoofing Bitwarden’s legitimate one (located at bitwariden[.]com) has been offering fake installation packages containing the ZenRAT

React to this headline:

Loading spinner

Fake Bitwarden installation packages delivered RAT to Windows users Read More »

High number of security flaws found in EMEA-developed apps

High number of security flaws found in EMEA-developed apps 27/09/2023 at 07:47 By Help Net Security Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions analysed, EMEA also has the highest percentage of ‘high severity’

React to this headline:

Loading spinner

High number of security flaws found in EMEA-developed apps Read More »

The pitfalls of neglecting security ownership at the design stage

The pitfalls of neglecting security ownership at the design stage 27/09/2023 at 07:01 By Mirko Zorz For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond the IT and network access aspects. In this Help Net

React to this headline:

Loading spinner

The pitfalls of neglecting security ownership at the design stage Read More »

Network Flight Simulator: Open-source adversary simulation tool

Network Flight Simulator: Open-source adversary simulation tool 27/09/2023 at 06:31 By Mirko Zorz Network Flight Simulator is a lightweight utility that generates malicious network traffic and helps security teams evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic

React to this headline:

Loading spinner

Network Flight Simulator: Open-source adversary simulation tool Read More »

Cloud service inefficiencies drain IT budgets

Cloud service inefficiencies drain IT budgets 27/09/2023 at 06:01 By Help Net Security 71% of IT professionals stated that cloud-related costs make up 30% or more of their total IT spend, according to Aptum. In the current demanding economic environment, organizations are becoming increasingly aware of the financial implications of their business operations. While the

React to this headline:

Loading spinner

Cloud service inefficiencies drain IT budgets Read More »

Guide: SaaS Offboarding Checklist

Guide: SaaS Offboarding Checklist 27/09/2023 at 05:49 By Help Net Security Download this template from Nudge Security for the essential steps of IT offboarding in the age of SaaS. This employee offboarding checklist covers the murky territory of offboarding SaaS access for departing employees—a land of common pitfalls and missed steps. Download a tailored Google

React to this headline:

Loading spinner

Guide: SaaS Offboarding Checklist Read More »

Critical JetBrains TeamCity vulnerability could be exploited to launch supply chain attacks (CVE-2023-42793)

Critical JetBrains TeamCity vulnerability could be exploited to launch supply chain attacks (CVE-2023-42793) 26/09/2023 at 18:01 By Zeljka Zorz Software development firm JetBrains has fixed a critical vulnerability (CVE-2023-42793) in its TeamCity continuous integration and continuous delivery (CI/CD) solution, which may allow authenticated attackers to achieve remote code execution and gain control of the server.

React to this headline:

Loading spinner

Critical JetBrains TeamCity vulnerability could be exploited to launch supply chain attacks (CVE-2023-42793) Read More »

Cl0p’s MOVEit attack tally surpasses 2,000 victim organizations

Cl0p’s MOVEit attack tally surpasses 2,000 victim organizations 26/09/2023 at 15:01 By Helga Labus The number of victim organizations hit by Cl0p via vulnerable MOVEit installations has surpassed 2,000, and the number of affected individuals is now over 60 million. The victim organizations are overwhelmingly based in the US. “The most heavily impacted sectors are

React to this headline:

Loading spinner

Cl0p’s MOVEit attack tally surpasses 2,000 victim organizations Read More »

Has Sony been hacked again?

Has Sony been hacked again? 26/09/2023 at 13:19 By Zeljka Zorz Ransomed.vc, a relatively new ransomware / cyber extortion group, claims to have hacked Sony and made off with valuable data. Sony allegedly hacked and its data held for ransom “We have successfully compromissed all of sony systems. We wont ransom them! we will sell

React to this headline:

Loading spinner

Has Sony been hacked again? Read More »

Are developers giving enough thought to prompt injection threats when building code?

Are developers giving enough thought to prompt injection threats when building code? 26/09/2023 at 08:32 By Help Net Security With National Coding Week behind us, the development community has had its annual moment of collective reflection and focus on emerging technologies that are shaping the industry. Among these, large language models (LLMs) and “generative AI”

React to this headline:

Loading spinner

Are developers giving enough thought to prompt injection threats when building code? Read More »

5 free vulnerability scanners you should check out

5 free vulnerability scanners you should check out 26/09/2023 at 08:02 By Help Net Security Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive measure to anticipate potential attacker entry points. The

React to this headline:

Loading spinner

5 free vulnerability scanners you should check out Read More »

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros 26/09/2023 at 07:32 By Mirko Zorz MITRE ATT&CK, a common language for cybersecurity professionals to communicate with each other and better understand real-world adversary behaviors, celebrates its 10th anniversary this fall. In this Help Net Security interview, project leader Adam Pennington discusses

React to this headline:

Loading spinner

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros Read More »

IT workers see generative AI as a serious threat to their profession

IT workers see generative AI as a serious threat to their profession 26/09/2023 at 06:01 By Help Net Security While many IT workers see the productivity benefits of AI, 56% believe it benefits employers more than employees, according to Ivanti. Additionally, 63% are concerned generative AI tools might take their job in the next five

React to this headline:

Loading spinner

IT workers see generative AI as a serious threat to their profession Read More »

National Student Clearinghouse MOVEit breach impacts nearly 900 schools

National Student Clearinghouse MOVEit breach impacts nearly 900 schools 25/09/2023 at 14:31 By Helga Labus US educational nonprofit organization National Student Clearinghouse (NSC) has revealed that the breach of its MOVEit server ended up affecting almost 900 colleges and universities, and resulted in the theft of personal information of their students. The National Student Clearinghouse

React to this headline:

Loading spinner

National Student Clearinghouse MOVEit breach impacts nearly 900 schools Read More »

BinDiff: Open-source comparison tool for binary files

BinDiff: Open-source comparison tool for binary files 25/09/2023 at 13:01 By Help Net Security BinDiff is a binary file comparison tool to find differences and similarities in disassembled code quickly. It was made open source today. With BinDiff, you can identify and isolate fixes for vulnerabilities in vendor-supplied patches. You can also port symbols and

React to this headline:

Loading spinner

BinDiff: Open-source comparison tool for binary files Read More »

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats 25/09/2023 at 08:05 By Help Net Security Security processes are increasingly automated which has led some businesses to deprioritize developing their security teams’ defense skills. While antivirus and non-human generated threat detections efficiently identify vulnerabilities, they cannot detect every single threat. With the rising number

React to this headline:

Loading spinner

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats Read More »

How global enterprises navigate the complex world of data privacy

How global enterprises navigate the complex world of data privacy 25/09/2023 at 07:38 By Mirko Zorz In this Help Net Security interview, Evelyn de Souza, Head of Privacy Compliance, Oracle SaaS Cloud, talks about the constant efforts required to keep up with privacy laws in each country, and ensuring compliance across the entire organization. She

React to this headline:

Loading spinner

How global enterprises navigate the complex world of data privacy Read More »

Balancing cybersecurity with convenience and progress

Balancing cybersecurity with convenience and progress 25/09/2023 at 07:02 By Help Net Security Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecurity Most business and technology professionals feel that

React to this headline:

Loading spinner

Balancing cybersecurity with convenience and progress Read More »

Scroll to Top