Source: www.schneier.com – Author: Bruce Schneier HomeBlog Chinese Hacking of US Critical Infrastructure Everyone is writing about an interagency and international report on Chinese hacking of...
WordPress force installs critical Jetpack patch on 5 million sites – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Automattic, the company behind the open-source WordPress content management system, has started force installing a security patch on millions of...
Barracuda zero-day abused since 2022 to drop new malware, steal data – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Image: Bing Image Creator Network and email security firm Barracuda today revealed that a recently patched zero-day vulnerability had been...
WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The premium WordPress plugin ‘Gravity Forms,’ currently used by over 930,000 websites, is vulnerable to unauthenticated PHP Object Injection. Gravity...
Microsoft finds macOS bug that lets hackers bypass SIP root restrictions – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install “undeletable”...
RomCom malware spread via Google Ads for ChatGPT, GIMP, more – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into...
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass – Source:thehackernews.com
Source: thehackernews.com – Author: . May 31, 2023Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shared details of a now-patched flaw in Apple macOS that could be...
6 Steps to Effective Threat Hunting: Safeguard Critical Assets and Fight Cybercrime – Source:thehackernews.com
Source: thehackernews.com – Author: . Finding threat actors before they find you is key to beefing up your cyber defenses. How to do that efficiently and...
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . May 31, 2023Ravie LakshmananAdvanced Persistent Threat The threat actor known as Dark Pink has been linked to five new attacks aimed...
RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . May 31, 2023Ravie LakshmananCyber Threat / Malware The threat actors behind RomCom RAT are leveraging a network of fake websites advertising...
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months – Source:thehackernews.com
Source: thehackernews.com – Author: . May 31, 2023Ravie LakshmananNetwork Security / Zero Day Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw...
Danni Brooke to Spotlight the Role of Women in Cyber at Infosecurity Europe 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Danni Brooke, former Met police officer and star of Channel 4’s Hunted, has been confirmed as the keynote speaker at this...
Pentagon Cyber Policy Cites Learnings from Ukraine War – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Pentagon’s strategy for proactive disruption of malicious activity has been influenced by the unfolding events in Ukraine, according to a...
WordPress Rushes Out Jetpack Patch to Millions – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The software company behind popular blogging platform WordPress is automatically updating over five million installations of its Jetpack plugin after a...
Dark Pink APT Group Expands Tooling and Targets – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The scope of a cyber-attack campaign from noted APT group Dark Pink is broader than first thought, with researchers identifying five...
Microsoft found a new bug that allows bypassing SIP root restrictions in macOS – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Apple fixed a vulnerability discovered by Microsoft researchers that lets attackers with root privileges bypass System Integrity Protection (SIP). Researchers...
PyPI enforces 2FA authentication to prevent maintainers’ account takeover – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini PyPI is going to enforce two-factor authentication (2FA) for all project maintainers by the end of this year over security...
A database containing 478,000 RaidForums members leaked online – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The database of the popular RaidForums hacking forum has been leaked on a new hacking forum, 478,000 members exposed. A...
Discord Admins Hacked by Malicious Bookmarks – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running...
What is federated Identity? How it works and its importance to enterprise security – Source: www.csoonline.com
Source: www.csoonline.com – Author: Federated identity can be hugely beneficial for creating a solid user experience and better security, but it can be more costly and...
Phishing remained the top identity abuser in 2022: IDSA report – Source: www.csoonline.com
Source: www.csoonline.com – Author: The survey revealed phishing as the most common identity-related incident in 2022, with “emails” as the most popular type. Thinkstock Phishing was...
AI-automated malware campaigns coming soon, says Mikko Hyppönen – Source: www.csoonline.com
Source: www.csoonline.com – Author: The industry pioneer also expects cybersecurity to remain a growth business for years and sees Russian hacktivists as demoralizing European infosec teams....
Frontegg launches entitlements engine to streamline access authorization – Source: www.csoonline.com
Source: www.csoonline.com – Author: The new entitlement engine will be powered by context-aware logic controls (CALC) technology to effect context-based, fine-grained authorization controls.
Screen recording Android app found to be spying on users – Source: www.csoonline.com
Source: www.csoonline.com – Author: iRecorder was a legitimate app made available on Google Play Store in September 2021. A remote access trojan AhRat was most likely...
Warning: Lazarus Targets Windows IIS Web Servers For Initial Access – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The notorious Lazarus Group of North Korean state-sponsored threat actors is currently targeting vulnerable Windows Internet Information Services (IIS) web...
PyPI Enforcing 2FA for All Project Maintainers to Boost Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Python Package Index (PyPI) has announced that it will require all accounts that maintain a project to have two-factor...
Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Dental benefits manager MCNA has started sending notification letters to roughly nine million individuals to inform them that their personal...
Many Vulnerabilities Found in PrinterLogic Enterprise Software – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Vulnerabilities identified in PrinterLogic’s enterprise management printer solution could expose organizations to authentication bypass, SQL injection, cross-site scripting (XSS) and...
Critical infrastructure security: Challenges and best practices – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Mazhar Hamayun, Regional Architect and member of the Office of the CTO at Check Point. Introduction The lifeblood of our contemporary...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY...





























