Today's cybersecurity headlines are brought to you by ThreatPerspective


Biz & IT Ars Technica

Law enforcement operation takes down 22,000 malicious IP addresses worldwide

Operation Synergia II took aim at phishing, ransomware, and information stealing. An international coalition of police agencies has taken a major whack at criminals accused of running a host of online scams, inc

Published: 2024-11-07T23:12:23



Biz & IT Ars Technica

Thousands of hacked TP-Link routers used in yearslong account takeover attacks

The botnet is being skillfully used to launch "highly evasive" password-spraying attacks. Hackers working on behalf of the Chinese government are using a botnet of thousands of routers, cameras, and other Intern

Published: 2024-11-02T00:13:20



The Register - Software

Thanks, Linus. Torvalds patch improves Linux performance by 2.6%

21 lines that show the big man still has what it takes A relatively tiny code change by penguin premier Linus Torvalds is making a measurable improvement to Linux's multithreaded performance.

Published: 2024-11-06T17:32:07



The Register - Software

Google claims Big Sleep 'first' AI to spot freshly committed security bug that fuzzing missed

You snooze, you lose, er, win Google claims one of its AI models is the first of its kind to spot a memory safety vulnerability in the wild specifically an exploitable stack buffer underflow in SQLite which was then fixed before the buggy code's

Published: 2024-11-05T06:38:13



The Register - Software

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw There's a Windows Themes spoofing zero-day bug on the loose that allows attackers to steal people's NTLM credentials.

Published: 2024-10-30T21:30:06



The Verge - Securities

These are the passwords you definitely shouldn t be using

 There are those who choose “iloveyou” and those who opt for “fuckyou.” Others have distinct interests, like “pokemon,” “naruto,” “samsung,” and “minecraft.” Many more are just names, like “michelle” or “ashley,” but at least some people make ...

Published: 2024-11-13T11:43:03



The Verge - Securities

National Guard Discord leaker sentenced to 15 years in prison

A photo of the American flag with graphic warning symbols. After pleading guilty in March to six counts of willful retention and transmission of national defense information under the Espionage Act, former Air National Guard member Jack Teixeira was sentenced today to 15 years in prison for posting...

Published: 2024-11-12T18:48:56



The Verge - Securities

Amazon confirms employee data breach, but says it's limited to contact info

A laptop surrounded by green and pink message boxes that say “warning.” Amazon says a data breach exposed the email addresses, phone numbers, and building locations linked to its employees, as reported earlier by 404 Media. In a statement to The Verge, Amazon spokesperson Adam Montgomery said the company was “n...

Published: 2024-11-11T15:22:05



The Verge - Securities

A new iOS 18 security feature makes it harder for police to unlock iPhones

Photo collage of a phone with a combination lock and keyhole over the screen. There is an apparently new iOS 18 security feature that reboots iPhones that haven’t been unlocked in a few days, frustrating police by making it harder to break into suspects’ iPhones, according to 404 Media. 404 Media, which first report...

Published: 2024-11-09T11:49:47



The Verge - Securities

The FBI says Russian emails are sending fake bomb threats to polling stations

The FBI symbol atop a red, black and white background made of seven pointed stars. The Federal Bureau of Investigation has issued a warning that fake bomb threats are being emailed to US polling locations in multiple states that “appear to originate from Russian email domains.” “None of the threats have been determined to...

Published: 2024-11-05T15:14:02



The Verge - Securities

Hacker suspected in massive Ticketmaster, AT&T breaches arrested in Canada

Authorities in Canada have arrested a man suspected of stealing information from around 165 companies using Snowflake’s cloud storage services, as reported earlier by Bloomberg and 404 Media. In a statement to The Verge, Canada Department o...

Published: 2024-11-05T09:15:28



The Verge - Securities

Valorant is winning the war against PC gaming cheaters

 Riot has also developed methods to detect this new form of hardware-level DMA cheating thanks to Peterson. His invention essentially blocks reads to internal memory by suspicious devices. I recently ran into an issue with this DMA protection...

Published: 2024-11-04T10:00:00



The Verge - Securities

An Okta login bug bypassed checking passwords on some long usernames

Illustration of a password above an open combination lock, implying a data breach. On Friday evening, Okta posted an odd update to its list of security advisories. The latest entry reveals that under specific circumstances, someone could’ve logged in by entering anything for a password, but only if the account’s username ...

Published: 2024-11-01T22:00:13



BleepingComputer

US indicts Snowflake hackers who extorted $2.5 million from 3 victims

The Department of Justice has unsealed the indictment against two suspected Snowflake hackers, who breached more than 165 organizations using the services of the Snowflake cloud storage company. [...]

Published: 2024-11-13T13:52:18



BleepingComputer

Critical bug in EoL D-Link NAS devices now exploited in attacks

Attackers now target a critical severity vulnerability with publicly available exploit code that affects multiple models of end-of-life D-Link network-attached storage (NAS) devices. [...]

Published: 2024-11-13T13:36:07



BleepingComputer

New ShrinkLocker ransomware decryptor recovers BitLocker password

Bitdefender has released a decryptor for the 'ShrinkLocker' ransomware strain, which uses Windows' built-in BitLocker drive encryption tool to lock victim's files. [...]

Published: 2024-11-13T09:00:00



BleepingComputer

Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws

Today is Microsoft's November 2024 Patch Tuesday, which includes security updates for 89 flaws, including four zero-days, two of which are actively exploited. [...]

Published: 2024-11-12T14:00:36



BleepingComputer

FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023

The FBI, the NSA, and Five Eyes cybersecurity authorities have released a list of the top 15 routinely exploited vulnerabilities throughout last year, most of them first abused as zero-days. [...]

Published: 2024-11-12T11:48:27



BleepingComputer

Volt Typhoon rebuilds malware botnet following FBI disruption

The Chinese state-sponsored hacking group Volt Typhoon has begun to rebuild its "KV-Botnet" malware botnet after it was disrupted by law enforcement in January, according to researchers from SecurityScorecard. [...]

Published: 2024-11-12T10:49:06



Technology

Smart patch buzzes, twists and presses the skin to deliver a sense of touch

The haptic patch has a number of potential applications Scientists have devised a clever new method of allowing people to feel sensations that are transmitted to their skin. Beyond its applications in fields such as gaming and telepresence, the technology could also be used to guide the blind.Continue Rea...

Published: 2024-11-11T20:51:33



Threat Intelligence

Emerging Threats: Cybersecurity Forecast 2025Emerging Threats: Cybersecurity Forecast 2025Content Marketing Manager, Mandiant

Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping

Published: 2024-11-13T14:00:00



Ethical Hacking News

The Dark Side of Cryptocurrency: The Rise and Fall of Bitcoin Fog's Money Laundering Empire


Roman Sterlingov, 36, a dual Russian-Swedish national, has been sentenced to 12 years and six months in prison for his role in facilitating money laundering activities between 2011 and 2021 through his cryptocurrency mixing service, Bitcoin Fog.

Published: Sat Nov 9 00:58:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Advises Securing PAN-OS Interface Amid Potential Remote Code Execution Vulnerability Concerns



Palo Alto Networks has issued an alert warning customers of a potential remote code execution (RCE) vulnerability in its PAN-OS management interface. This vulnerability, tracked as CVE-2024-5910 with a CVSS score of 9.3, poses significant risks to network security and requires immediate attention from users. Organizations are advised to take proactive steps to secure their networks by following best practices outlined by Palo Alto Networks and staying informed about the latest developments in cybersecurity threats.

Published: Sat Nov 9 02:06:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Election Integrity Under Fire: The Dark Side of Far-Right Militias and Cyber threats

Election Integrity Under Fire: The Dark Side of Far-Right Militias and Cyber threats

In recent weeks, a disturbing trend has emerged from the far-right militia movement in the United States. Documents have revealed a history of voter intimidation plans, which pose a significant threat to the integrity of American elections. This article explores the dark side of far-right militias and cyber threats, shedding light on their tactics, impact, and the urgent need for a comprehensive national strategy to safeguard US elections.

Published: Sat Nov 9 06:26:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Frontier in Smartphone Security: Apple's Inactivity Reboot Feature Sparks Concerns Over Law Enforcement Access


A new iOS 18 security feature has been introduced, making it significantly more difficult for law enforcement to access data on iPhones that have not been unlocked in a certain period of time. The feature, which has been dubbed "inactivity reboot," causes iPhones to restart and enter a secure state after a four-day period of inactivity, thereby limiting the ability of forensic experts to extract data from these devices.

Published: Sat Nov 9 11:45:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cops Face New Hurdle as Apple Tightens iPhone Security with iOS 18.1 Update

Apple has introduced an update to its iOS operating system that includes a new security feature designed to prevent unauthorized access to iPhones and other devices. The update, which was rolled out recently, introduces an "inactivity reboot" mechanism that restarts a device after approximately four days being in a locked state. This change has significant implications for law enforcement agencies, who rely on iPhones as a critical tool for conducting investigations and gathering evidence.

Published: Sat Nov 9 11:58:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fractured Legacy of Halo: An Examination of the Series' Current State

Can Halo overcome its current struggles and reclaim its place as one of gaming's top franchises? Only time will tell.

Published: Sat Nov 9 13:11:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Ransomware Tactics: Unpacking the Frag Ransomware Attack

Ransomware groups continue to evolve and adapt their tactics, with the latest Frag ransomware attack highlighting the use of LOLBins as a key component of its strategy. As security teams must stay one step ahead of these threats, the importance of vigilance and proactive defense cannot be overstated.

Published: Sat Nov 9 13:42:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious PyPI Package Steals AWS Credentials from Over 37,000 Developers



A malicious Python package has been found on the Python Package Index (PyPI), which has stolen over 37,000 times. The 'fabrice' package exploits typosquatting tactics to obtain AWS credentials using a legitimate SDK for Amazon Web Services. By understanding this threat and taking preventative measures, developers can protect themselves against future attacks.


Published: Sat Nov 9 14:51:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Fake Emergency Data Requests: A Growing Concern for Cybersecurity


The FBI has issued an alert warning of a significant spike in hacked police emails and fake subpoenas, highlighting the need for increased security measures to protect email systems. Fake emergency data requests have become a pressing concern for cybersecurity experts, law enforcement agencies, and technology companies worldwide.

Published: Sat Nov 9 15:05:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mazda Connect Flaws Exposed: A Vulnerability Nightmare for Vehicle Owners

Security experts at Security Affairs have exposed critical vulnerabilities in Mazda's infotainment system, dubbed "Mazda Connect". The findings have left vehicle owners wondering about their safety and the potential consequences of such a vulnerability being exploited. Read more to learn about the critical vulnerabilities identified by Pierluigi Paganini.

Published: Sat Nov 9 17:30:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Alert: Salt Typhoon Hack Impacts Telco Providers and Raises Concerns for Employee Phone Use


The U.S. agency has issued an alert warning employees to limit their phone use due to a sophisticated cyber attack on major telco providers known as the Salt Typhoon hack. The hackers gained access to sensitive data, including customer information and proprietary business records, posing significant risks to national security.

Published: Sun Nov 10 05:01:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Evolves with Increasing Sophistication: A Review of Recent Threats and Vulnerabilities

Recent threats and vulnerabilities have highlighted the ongoing threat posed by cybercrime, including APT groups, phishing campaigns, and supply chain attacks.

Published: Sun Nov 10 07:29:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Security Breaches and Vulnerabilities: A Global Landscape of Threats

Security breaches and vulnerabilities are a persistent threat in today's digital landscape. From Mazda Connect flaws to ransomware attacks on critical infrastructure, this article highlights the importance of prioritizing security when handling sensitive user information and staying up-to-date with software patches.

Published: Sun Nov 10 07:56:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Take Advantage of Ticketmaster Data Breach: A Growing Concern for Concertgoers

Hackers are taking advantage of Ticketmaster's data breach by stealing tickets from users' accounts, leaving fans feeling vulnerable and anxious about their tickets. The company has implemented some security measures to address the issue, but more needs to be done to protect users' sensitive information.

Published: Sun Nov 10 13:15:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Leverage ZIP File Concatenation to Evade Detection in Phishing Attacks


Hackers are using a new technique to evade detection in phishing attacks by concatenating ZIP files. This approach exploits the different ways that various ZIP parsers handle concatenated ZIP files, making it challenging for security solutions to detect these types of attacks. By understanding this technique and taking steps to defend against it, individuals and organizations can reduce their risk of falling victim to these sophisticated attacks.

Published: Sun Nov 10 18:30:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Mastermind Behind a Massive Snowflake Breach is Busted by Canadians


A mastermind behind a massive Snowflake breach has been arrested in Canada, bringing an end to his reign of cyber terror. Alexander "Connor" Moucka is believed to be connected to the compromise of at least 165 Snowflake customers, including prominent names such as AT&T and Ticketmaster. The arrest serves as a significant development in the case, highlighting the importance of implementing robust security measures to prevent similar breaches in the future.

Published: Sun Nov 10 21:57:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Leverage Microsoft Excel Exploit to Spread Fileless Remcos RAT Malware via Phishing Campaign


A new phishing campaign exploits a known remote code execution flaw in Microsoft Office to spread fileless variants of the notorious Remcos RAT malware. The attack leverages purchase order-themed lures to trick recipients into opening malicious Excel attachments, highlighting the ongoing evolution of sophisticated cybersecurity threats.

Published: Mon Nov 11 01:14:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Convergence of Cyber Threats: Pro-Russia Actors Intensify Attacks on South Korea Amidst North Korean Troop Deployment


South Korea is facing an intensification of distributed denial-of-service (DDoS) attacks from pro-Russian hacktivist groups, targeting public and private websites. This surge in cyberattacks comes following the decision to monitor North Korean troops in Ukraine, which has raised concerns about potential escalation of conflicts involving multiple nations. The South Korean government plans to enhance cyber threat preparedness through monitoring and ongoing collaboration among relevant agencies.

Published: Mon Nov 11 02:52:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dawn of Autonomous Gun Systems: A Revolutionary Counter-Drone Defense


The US Army has unveiled the Bullfrog, an AI-powered turret capable of precise engagement of airborne targets with minimal ammunition expenditure. This cutting-edge technology marks a significant milestone in the evolution of modern warfare, sparking debates about its potential implications on future military operations.

Published: Mon Nov 11 05:13:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Severe Security Flaws in Popular Machine Learning Toolkits Expose Organizations to Server Hijacks and Privilege Escalation


A recent analysis by JFrog has uncovered nearly two dozen security vulnerabilities in popular machine learning (ML) toolkits, exposing organizations to server hijacks and privilege escalation attacks. The most significant vulnerability, CVE-2024-7340, was discovered in the Weave ML toolkit, while others were identified in the Deep Lake AI-oriented database, Vanna.AI library, and Mage AI framework. The severity of these vulnerabilities cannot be overstated, as they can lead to a severe breach of sensitive data and operations.

Published: Mon Nov 11 05:32:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

HPE Urges Swift Patching of Critical Aruba Access Point Vulnerabilities to Prevent Remote Code Execution


Hewlett Packard Enterprise (HPE) has released critical security patches to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The patches aim to prevent remote code execution by mitigating these high-severity vulnerabilities.

Published: Mon Nov 11 05:54:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Web's Crypto Laundry Kingpin Falls: A Case Study of Bitcoin Fog's Demise

A Russian-Swedish national has been sentenced to 12 years and six months in US prison for operating one of the longest-running money laundering machines on the dark web. Bitcoin Fog's demise marks a significant blow to those who facilitate criminal activity on the dark web, but experts note that other services will likely fill the gap.

Published: Mon Nov 11 07:16:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Wave of Cyber Threats: A Comprehensive Analysis of Emerging Malware and Exploits


A new wave of sophisticated cyber threats has emerged, with AndroxGh0st malware integrating with the Mozi botnet, ToxicPanda targeting banks in Europe and Latin America, VEILDrive exploiting Microsoft services, and CRON#TRAP spreading across Windows systems. These exploits underscore the need for increased vigilance and proactive measures to protect against emerging threats.

Published: Mon Nov 11 07:33:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Impact of Automated Security Validation on Cybersecurity Leaders: A Success Story

DTCC's implementation of Automated Security Validation has shown significant benefits for the organization, including improved productivity, reduced risk, and enhanced employee retention. This success story highlights the importance of embracing automation in cybersecurity and explores the key considerations for securing a budget for secure validation.

Published: Mon Nov 11 07:49:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Halliburton's Ransomware Nightmare: A $35 Million Price Tag for a Cybersecurity Breach

Halliburton has revealed that an August ransomware attack led to $35 million in losses after the breach caused the company to shut down IT systems and disconnect customers. The RansomHub ransomware gang was responsible for the attack, which stole data from Halliburton's network.

Published: Mon Nov 11 09:31:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Wave of Fileless Malware Threatens Global Security: The Rise of Remcos RAT

A new variant of the commercial RAT tool known as Remcos has been discovered in a phishing campaign, posing significant risks due to its stealthy and fileless nature. As threat actors continue to evolve their tactics, it is essential for organizations to stay vigilant and implement robust cybersecurity measures.

Published: Mon Nov 11 09:49:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Halliburton's $35 Million Ransomware Loss Exposes the Industry's Reliance on Cybersecurity


Halliburton has revealed that a ransomware attack in August 2024 resulted in a $35 million loss, exposing the industry's reliance on cybersecurity. The attack, attributed to the RansomHub ransomware gang, forced the company to shut down its IT infrastructure and disconnect customers' systems. The incident highlights the importance of robust cybersecurity measures and incident response planning for organizations operating in high-risk industries.

Published: Mon Nov 11 11:04:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Emergency Data Requests: A Growing Concern for Cybersecurity


The FBI has issued a warning about the growing trend of crooks stealing data using government emails, specifically through emergency data requests (EDRs). This phenomenon has been on the rise since August 2023, with a significant increase in fraudulent requests being sent to US businesses and law enforcement agencies. As cybercriminals become more sophisticated in their tactics, it is essential for organizations to stay vigilant and proactive in mitigating risks. The FBI recommends developing a close relationship with local field offices, reviewing incident response plans, and adopting critical thinking when receiving EDRs.

Published: Mon Nov 11 11:13:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Sophisticated Malware Campaigns: GootLoader's Latest Targeting of Innocent Users



A new malware campaign known as GootLoader has been identified by Sophos researchers, targeting innocent users who search for specific information on search engines. The campaign uses SEO poisoning tactics to deliver a loader for other malware families, including GootKit, an information stealer and remote access trojan (RAT). This latest development highlights the ongoing evolution of cyber threats and the need for users to be vigilant when searching online.



Published: Mon Nov 11 12:52:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

AAmazon Data Breach: A Cautionary Tale of Vendor Vulnerabilities

Amazon confirms employee data breach after vendor hack, highlighting the ongoing struggle between robust security protocols and vulnerabilities in third-party systems.

Published: Mon Nov 11 14:12:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Mysterious Data Breach Exposes Amazon Employee Contact Information: A Cautionary Tale of Cybersecurity Vulnerabilities

A major tech company has confirmed that a data breach occurred, exposing the personal contact information of its employees. The breach, which appears to be related to a security vulnerability discovered last year, raises concerns about the company's ability to prevent data breaches and highlights the ongoing threat of cyberattacks.

Published: Mon Nov 11 15:19:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revolutionizing Human Perception: The Breakthrough Haptic Patch Technology


Revolutionizing Human Perception: The Breakthrough Haptic Patch Technology

Scientists at Northwestern University have developed a revolutionary new patch that can transmit sensations to the skin, allowing people to feel tactile information even when they are blindfolded. This technology has far-reaching implications for virtual reality, gaming, and assistive devices for individuals with vision impairments. Learn more about this groundbreaking innovation and its potential impact on our daily lives.

Published: Mon Nov 11 15:33:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Ymir Ransomware Family Partners with RustyStealer to Spread Malicious Operations


The emergence of Ymir ransomware marks a significant development in the collaboration between malware families used by cybercrime groups. Partnering with RustyStealer, Ymir has evolved into an even more potent threat due to its advanced evasion techniques and use of information stealers as access brokers. With this partnership, users must ensure their security measures are updated to counter the evolving landscape of ransomware attacks.

Published: Mon Nov 11 17:03:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hot Topic Data Breach Exposes 57 Million Customers' Personal Information


A massive data breach has exposed 57 million Hot Topic customers' personal information. The incident is believed to have occurred in October 2024 and includes sensitive data such as email addresses, phone numbers, physical addresses, and partial credit card details. Follow our article to learn more about the breach, its possible causes, and how you can protect yourself.


Published: Mon Nov 11 17:09:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Threat Landscape: Cybercrime on the Rise

Amazon's recent data breach highlights the growing threat of zero-day exploits and the need for organizations to prioritize cybersecurity measures. The incident, which exposed over 2.8 million records containing employee data, underscores the increasing sophistication and frequency of cybercrimes.

Published: Mon Nov 11 17:36:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks



The Ymir ransomware variant has emerged as a significant development in contemporary cyber threats, leveraging memory management functions to evade detection and increase its stealth capabilities. With the rise of new variants like AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services and VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware, organizations must prioritize robust cybersecurity defenses against emerging threats. Staying informed about these evolving risks is crucial for maintaining the security of corporate networks.



Published: Tue Nov 12 02:04:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Age of Inescapable Surveillance: How to Protect Yourself from a Trump-Driven America

As Donald Trump takes the reins of power in America, the prospect of government overreach and technological snooping becomes an ever-present concern. Learn how to protect yourself from this tidal wave of surveillance with these expert-recommended strategies for safeguarding your digital privacy.

Published: Tue Nov 12 05:45:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Masked Protester: A Looming Threat to Free Speech

The mask ban at protests has sparked heated debates among civil rights advocates, law enforcement officials, and lawmakers, with some arguing that such measures are necessary to hold protesters accountable, while others contend that they will only serve to chill free speech and open protesters up to harassment by political opponents.

Published: Tue Nov 12 06:08:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Behavioral Analytics: The New Frontier in Incident ResponseThe Hacker News


Behavioral Analytics is Back: How It's Revolutionizing Incident Response and SOC Investigation
The use of behavioral analytics in cybersecurity has seen a resurgence in recent years, as organizations look for ways to improve their incident response processes. Once primarily used for threat detection, it is now being reimagined as a powerful post-detection technology that enhances the accuracy, efficiency, and impact of Security Operations Center (SOC) investigations. This article will explore five key ways behavioral analytics is revolutionizing incident response, helping security teams respond with greater speed and precision.


Published: Tue Nov 12 06:31:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Security Feature Raises Concerns: Apple's "Inactivity Reboot" Feature Automatically Reboots Locked Devices

Apple's "inactivity reboot" feature raises concerns over security and law enforcement in forensic analysis settings where iPhones await examination. The feature aims to enhance data security by erasing sensitive information from memory, but its potential impact on current tools used for forensic analysis is a pressing issue that requires immediate attention.

Published: Tue Nov 12 07:05:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Stealthy Threat Emerges: The Ymir Ransomware


A new stealthy threat has emerged in the form of the Ymir ransomware, a malware family that has been making waves in the cybercrime world. This article provides an in-depth look at the Ymir ransomware, its detection-evasion features, and the evolving nature of cybercrime threats.

Published: Tue Nov 12 07:26:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Chapter in the History of Cybersecurity: The MOVEit Vulnerability and its Devastating Consequences

A major data breach has occurred at Amazon, exposing employee information from various organizations, including Amazon itself. The breach is linked to the MOVEit vulnerability, a critical bug discovered in 2023. The level of detail provided by the breach raises concerns about potential security threats and highlights the importance of keeping software up-to-date and patching vulnerabilities in a timely manner.

Published: Tue Nov 12 09:09:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Erosion of Personal Privacy: How Technology is Compromising Our Most Fundamental Rights


The use of technology has led to a significant erosion of personal privacy, with smartphones, cryptocurrencies, and digital payment systems posing a threat to individuals' right to anonymity. As law enforcement agencies become increasingly sophisticated in their ability to track and analyze data, experts are urging individuals to take steps to protect themselves, including using alternative forms of payment or specialized tools like Faraday bags.

Published: Tue Nov 12 09:24:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Citrix Vulnerability Exposed: Misconfigured MSMQ Allows RCE via BinaryFormatter


A recent discovery has exposed a critical vulnerability in Citrix Virtual Apps and Desktops that could be exploited to achieve unauthenticated remote code execution (RCE) through misconfigured MSMQ instances. The issue highlights the importance of ensuring sensitive services are properly secured and not exposed unnecessarily. Organizations must take immediate action to address this vulnerability and secure their systems against potential attacks.

Published: Tue Nov 12 09:32:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns: A Threat to Cybersecurity

A new phishing tool called GoIssue has emerged, targeting GitHub developers in bulk email campaigns. The threat actor behind the tool claims it offers precision and power for reaching specific audiences or expanding outreach. As a result, there is an increased risk of successful breaches, data theft, and compromised projects among thousands of developers.

Published: Tue Nov 12 09:40:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers Utilize Flutter-Embedded Malware to Infiltrate Apple macOS Devices


North Korean hackers have successfully embedded malware within Flutter applications, marking a new tactic in their efforts to infiltrate Apple macOS devices. The malicious code was identified by Jamf Threat Labs, which noted that the threat actors are using social engineering techniques to achieve their objectives. This discovery highlights the evolving threat landscape of cybersecurity and underscores the importance of staying vigilant and adopting proactive measures to protect against emerging threats.

Published: Tue Nov 12 10:00:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI, CISA, and NSA Unveil Most Exploited Vulnerabilities of 2023: A Wake-Up Call for Organizations Worldwide


FBI, CISA, and NSA Unveil Most Exploited Vulnerabilities of 2023: A Wake-Up Call for Organizations Worldwide

A joint advisory from the FBI, CISA, and NSA has highlighted the most exploited vulnerabilities of 2023, serving as a stark reminder to organizations worldwide to prioritize patch management and bolster their defenses against increasingly sophisticated cyber threats. Learn more about the top 15 vulnerabilities and what organizations can do to stay ahead of emerging threats.

Published: Tue Nov 12 12:12:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revival of the KV-Botnet: A Rebuilding Effort by Chinese State-Sponsored Hacking Group Volt Typhoon Following FBI Disruption

Chinese state-sponsored hacking group Volt Typhoon has successfully rebuilt its KV-Botnet malware botnet following a disruption by law enforcement, posing a significant threat to global cybersecurity. The rebuilding effort indicates that the Chinese hackers remain determined in their pursuit of infiltrating critical networks and maliciously exploiting vulnerable devices.

Published: Tue Nov 12 12:21:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers' Sophisticated Attack on macOS Security: A New Frontier in Malware Development


North Korean hackers have been using Flutter-based apps to bypass the security features of Apple's macOS operating system. The attacks were discovered through analysis of six malicious applications built with Google's Flutter framework. This revelation marks a new frontier in malware development, as it showcases the level of sophistication and creativity employed by nation-state actors.

Published: Tue Nov 12 12:32:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Virtual Apps and Desktops Vulnerability: A Serious Security Threat to Enterprise Networks


Citrix's Virtual Apps and Desktops solution has been hit with a new security vulnerability that allows attackers to gain unauthorized access to sensitive data and escalate privileges on the system. The vulnerability, identified as CVE-2024-8068, is considered serious and organizations should take immediate action to patch their systems.

Published: Tue Nov 12 12:44:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Managing Third-Party Risks in Complex IT Environments: A Crucial Step Towards Ensuring Organizational Security


A recent webinar by SailPoint aims to provide actionable insights into securing an organization's data and systems against third-party access threats. By adopting best practices for managing third-party risks, IT managers and security professionals can reduce the likelihood of data breaches and minimize financial losses.

Published: Tue Nov 12 12:51:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Threats on the Rise: A Global Landscape of Attacks and Breaches

As the threat landscape continues to evolve, organizations must take proactive steps to protect themselves against emerging threats. With an estimated $6 trillion in global costs expected by 2023, it is clear that cybercrime poses a significant challenge for governments and individuals alike.

Published: Tue Nov 12 13:19:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

November 2024 Patch Tuesday Security Update Roundup: Four Zero-Days Fixed


November 2024 Patch Tuesday has addressed a total of 91 security vulnerabilities, including four critical zero-day exploits. The update aims to fix multiple flaws in various Windows components and services, including the SMBv3 client and server, Windows Task Scheduler, and Windows Telephony Service. Learn more about the patches included in this month's update.



Published: Tue Nov 12 15:10:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ahold Delhaize's US Grocery Chain Embroiled in Widespread Cybersecurity Crisis Amid Ongoing Outages


Ahold Delhaize, a multinational retail company that operates grocery stores under various brand names across the United States, has been experiencing a prolonged cybersecurity crisis. The situation has resulted in outages at numerous locations, with varying degrees of impact on services and operations. With nearly 2,000 stores affected and an estimated 1,000 belonging to Food Lion alone, this incident underscores the ongoing vulnerability of retail operations in the digital age.

Published: Tue Nov 12 15:29:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ahold Delhaize Cyber Incident: A Complex Web of Consequences for the Multinational Retail Giant

Ahold Delhaize, a multinational retail giant, has faced a significant cyber incident affecting several of its US brands, including Giant Food, Hannaford, pharmacies, and e-commerce services. The company has acknowledged the impact of the incident but assures customers that all brand stores remain open and serving customers. Ahold Delhaize is taking proactive measures to assess and mitigate the problem and protect its customers from potential cyber threats.

Published: Tue Nov 12 15:50:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's November 2024 Patch Tuesday: A Multifaceted Threat Landscape

Microsoft has released its November 2024 Patch Tuesday with fixes for at least 89 security vulnerabilities in Windows operating systems and other software. The update includes patches for two zero-day vulnerabilities already being exploited by attackers, highlighting the ongoing importance of staying up-to-date with security patches.

Published: Tue Nov 12 17:13:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Shadowy Snowflake Hackers: A Web of Deceit and Data Exploitation

Two Canadian and American hackers have been indicted on 20 counts of conspiracy, computer fraud and abuse, wire fraud, and aggravated identity theft in connection with a high-profile cyber attack on multiple organizations' Snowflake-hosted cloud environments. The alleged hackers exploited vulnerabilities to steal sensitive data and extort ransoms from their victims, with at least three paying $2.5 million to have their data returned.

Published: Tue Nov 12 17:21:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Guard Discord Leaker Receives Lenient Sentence Despite Compromising National Security

Jack Teixeira, a former Air National Guard member, has been sentenced to 15 years in prison for leaking classified military information on Discord. The case highlights the dangers of unchecked access to sensitive information and the need for vigilance in protecting national security.

Published: Tue Nov 12 18:37:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Security Breach of Epic Proportions: The Case of Jack Teixeira, a 22-Year-Old Air National Guardsman

A former Air National Guardsman has been sentenced to 15 years in prison for leaking classified American military secrets on Discord, highlighting the importance of adhering to protocols regarding sensitive information and the need for vigilance in safeguarding national security.

Published: Tue Nov 12 18:49:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Patch Tuesday: A Gauntlet of Vulnerabilities for Windows Users

Microsoft has released 89 patches for various security vulnerabilities, including two currently under active attack, as part of its latest Patch Tuesday. Users are advised to address these issues promptly to prevent potential security breaches.

Published: Tue Nov 12 20:05:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Volt Typhoon's Resurgence: A New Wave of Chinese Cyber Espionage Threatens Global Critical Infrastructure


China's Volt Typhoon crew has resurfaced with a vengeance, compromising critical infrastructure networks and launching devastating cyberattacks. A new wave of Chinese cyber espionage threatens global critical infrastructure, highlighting the need for organizations to prioritize cybersecurity and stay vigilant in the face of evolving threats.

Published: Tue Nov 12 20:16:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT PATCH TUESDAY SECURITY UPDATES: TWO ACTIVELY EXPLOITED ZERO-DAYS FIXED IN NOVEMBER 2024

Microsoft Patch Tuesday security updates for November 2024 fix two actively exploited zero-days in Android devices and Linux clients. These vulnerabilities allow attackers to gain unauthorized access to sensitive information, including user IP addresses.

Published: Tue Nov 12 20:36:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT UNVEILS 90 NEW SECURITY PATCHES, INCLUDING ACTIVELY EXPLOITED NTLM AND TASK SCHEDULER VULNERABILITIES


Microsoft has released 90 new security patches, including actively exploited vulnerabilities in NTLM and Task Scheduler. The update addresses a range of critical vulnerabilities, including remote code execution flaws and elevation of privilege vulnerabilities. Organizations are advised to prioritize patching these vulnerabilities as soon as possible to prevent potential exploitation.

Published: Wed Nov 13 02:08:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Hackers Employ "Dream Job" Lures to Wreak Havoc on Aerospace Industry with SnailResin Malware

TA455, a Iranian threat actor believed to be affiliated with the Islamic Revolutionary Guard Corps (IRGC), has been linked to a series of targeted attacks on aerospace industry professionals using fake job opportunities and the SnailResin malware. This campaign marks a significant escalation in the group's activities and highlights the need for organizations in the industry to enhance their security measures.

Published: Wed Nov 13 03:24:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution



A recent security analysis has uncovered 10 vulnerabilities in the OvrC platform, exposing IoT devices to remote attacks and code execution. The discovery highlights the need for greater vigilance and cooperation among manufacturers, cloud service providers, and regulatory agencies to secure these vulnerable platforms.



Published: Wed Nov 13 06:07:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Surveillance State: ICE's Mass Deportation Plan Takes Shape

ICE is expanding its surveillance apparatus to monitor millions of non-detained individuals awaiting deportation hearings, sparking concerns about civil liberties, data collection, and individual freedoms. The agency's plan, outlined in a recent notice, seeks contractors to deploy technology and personnel to monitor these individuals under the new Release and Reporting Management (RRM) program.

Published: Wed Nov 13 07:32:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Roadmap for Building a Strong Browser Security Program


In an era where cybersecurity threats are becoming increasingly sophisticated and prevalent, it is imperative for organizations to adopt proactive measures to safeguard their digital assets. A comprehensive browser security program is essential to address the growing threat landscape and mitigate emerging risks. This article provides a detailed roadmap for CISOs and security teams to establish effective browser security programs.

Published: Wed Nov 13 07:41:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New ShrinkLocker Ransomware Decryptor: A Breakthrough in Restoring BitLocker Passwords

New ShrinkLocker ransomware decryptor: A breakthrough in restoring BitLocker passwords has been made possible by researchers at Bitdefender, giving victims a new hope of recovering their data from the malware.

Published: Wed Nov 13 08:52:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Forecast 2025: Navigating the Evolving Threat Landscape with Caution


Google Cloud's Cybersecurity Forecast 2025 Report Reveals Emerging Threats to Expect in the Coming Year
The report highlights key trends and threats that organizations can anticipate facing in the year ahead, including the increasing use of AI for sophisticated attacks and the growing threat of ransomware and multifaceted extortion.


Published: Wed Nov 13 09:00:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NordPass Black Friday Deal: A Comprehensive Guide to Cybersecurity Savings


In a major move, NordPass is offering an unbeatable Black Friday deal that promises to revolutionize cybersecurity for millions of users worldwide. With discounts up to 44% off the regular price, individuals can secure a Premium subscription to NordPass or bundle it with NordVPN at an unprecedented low cost. Don't miss out on this incredible opportunity to elevate your digital security!

Published: Wed Nov 13 10:20:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hamas-Affiliated Group Expands Malicious Activities to Disrupt Israeli Entities


A Hamas-affiliated group known as WIRTE has expanded its malicious activities beyond espionage to carry out disruptive attacks against Israeli entities, targeting other countries in the region. The threat actor's use of sophisticated malware tools, including the SameCoin wiper, highlights the need for increased vigilance and cooperation between countries to counter these types of threats.

Published: Wed Nov 13 10:33:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShrinkLocker Ransomware: A New Threat to Data Protection


In a recent development that has sent shockwaves through the cybersecurity community, Romanian cybersecurity company Bitdefender has released a free decryptor for victims of the ShrinkLocker ransomware. This malicious software was designed to be simple yet effective, using Microsoft's native BitLocker utility to encrypt files as part of extortion attacks targeting Mexico, Indonesia, and Jordan.

Published: Wed Nov 13 10:43:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zoom Addresses High-Severity Vulnerabilities in Video Conferencing Platform


Zoom addressed two high-severity issues in its platform that could allow remote attackers to escalate privileges or leak sensitive information, including a buffer overflow issue and an improper input validation issue.



Published: Wed Nov 13 11:10:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Most Insecure Passwords: A Glimpse into Humanity's Laziness


A recent study by a prominent password manager has shed light on some of the most commonly used – and therefore least secure – passwords in use worldwide, revealing a concerning trend that highlights humanity's propensity for laziness when it comes to protecting personal information. In this article, we will delve into the findings of this study and explore the implications of these results.


Published: Wed Nov 13 12:33:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Snowflake Saboteurs: A Complex Web of Cybercrime and Deceit


Two Snowflake hackers have been indicted by US authorities for extorting $2.5 million from three victims through a complex web of cybercrime and deceit. The indictment, which was unsealed last month, reveals the sophisticated tactics employed by Connor Riley Moucka and John Erin Binns to breach over 165 organizations using Snowflake cloud storage services. The case highlights the complexities of modern cybercrime and the importance of collaboration between law enforcement agencies worldwide.

Published: Wed Nov 13 14:12:46 2024 by llama3.2 3B Q4_K_M










     


© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us