Aggregator
Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command
5 months 1 week ago
Notorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection.
Mhica Romero
Google fixed actively exploited Android flaw CVE-2024-32896
5 months 1 week ago
Google addressed a security vulnerability in its Android operating system that is actively exploited in attacks in the wild. Google addressed a high-severity vulnerability, tracked as CVE-2024-32896 (CVSS score: 7.8), in its Android operating system that is under active exploitation in the wild. The vulnerability CVE-2024-32896 is a privilege escalation in the Android Framework component. […]
Pierluigi Paganini
Microchip Technology confirms data was stolen in cyberattack
5 months 1 week ago
American semiconductor supplier Microchip Technology Incorporated has confirmed that employee information was stolen from systems compromised in an August cyberattack, which was later claimed by the Play ransomware gang. [...]
Sergiu Gatlan
Play
5 months 1 week ago
cohenido
Play
5 months 1 week ago
cohenido
Play
5 months 1 week ago
cohenido
Play
5 months 1 week ago
cohenido
Specialize in Securing Critical Infrastructure
5 months 1 week ago
How You Can Help Secure the Nation's Backbone From Cyberattacks
Critical infrastructure encompasses the essential services and assets vital to the functioning of society and the economy. Specializing in security in this field requires a deep understanding of the challenges and threats facing sectors such as energy, transportation, healthcare and water systems.
Critical infrastructure encompasses the essential services and assets vital to the functioning of society and the economy. Specializing in security in this field requires a deep understanding of the challenges and threats facing sectors such as energy, transportation, healthcare and water systems.
Oswal: AI, Platformization Key to Network Security Evolution
5 months 1 week ago
Unifying fragmented network security technology under a single platform allows for consistent policy application across on-premises, cloud and hybrid environments, said Palo Alto Networks' Anand Oswal. Having a consistent policy framework simplifies management and improves security outcomes.
US Targets Russian Media and Hackers Over Election Meddling
5 months 1 week ago
DOJ Seizes Internet Domains, Announces Sanctions Against Russian Media Executives
The United States on Wednesday accused Russia of carrying out a sustained campaign to influence the 2024 presidential election and announced a series of sanctions and law enforcement actions that target state-sponsored hackers and media executives behind Kremlin influence operations.
The United States on Wednesday accused Russia of carrying out a sustained campaign to influence the 2024 presidential election and announced a series of sanctions and law enforcement actions that target state-sponsored hackers and media executives behind Kremlin influence operations.
AI Is Changing the Face of Fraud - And Fraud Fighting
5 months 1 week ago
Banks Using AI to Spot Fraud, Create Synthetic Data for Better Predictive Analytics
While the criminals may have an advantage in the AI race, banks and other financial services firms are responding with heightened awareness and vigilance, and a growing number of organizations are exploring AI tools to improve fraud detection and response to AI-driven scams.
While the criminals may have an advantage in the AI race, banks and other financial services firms are responding with heightened awareness and vigilance, and a growing number of organizations are exploring AI tools to improve fraud detection and response to AI-driven scams.
Telegram Removes Deepfake Videos at South Korea's Behest
5 months 1 week ago
Social Media Platform Deleted 25 Videos South Korean Government Said Showed Crimes
Telegram deleted 25 videos the South Korean Communications Standards Commission said depicted sex crimes, and regulators reported that site administrators pledged a "relationship of trust." The agency said it intends to establish a hotline to ensure urgent action on deepfakes.
Telegram deleted 25 videos the South Korean Communications Standards Commission said depicted sex crimes, and regulators reported that site administrators pledged a "relationship of trust." The agency said it intends to establish a hotline to ensure urgent action on deepfakes.
Federal CIO Says Agencies on Track for Zero Trust Milestones
5 months 1 week ago
Top Government Agencies 'All in the High 90% Range' for Completion, Says Martorana
Federal Chief Information Officer Clare Martorana told the Billington CyberSecurity Summit on Wednesday that the 24 CFO Act Agencies are on track to meet the Sept. 30 deadline given in the federal zero trust strategy released in 2022, which includes key milestones due at the end of the fiscal year.
Federal Chief Information Officer Clare Martorana told the Billington CyberSecurity Summit on Wednesday that the 24 CFO Act Agencies are on track to meet the Sept. 30 deadline given in the federal zero trust strategy released in 2022, which includes key milestones due at the end of the fiscal year.
CISA ICS CTF 2024
5 months 1 week ago
Name: CISA ICS CTF 2024 (an CISA ICS CTF event.)
Date: Aug. 31, 2024, 5 p.m. — 04 Sept. 2024, 16:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.cisaicsctf.com/
Rating weight: 24.89
Event organizers: CISA ICSJWG
Date: Aug. 31, 2024, 5 p.m. — 04 Sept. 2024, 16:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.cisaicsctf.com/
Rating weight: 24.89
Event organizers: CISA ICSJWG
White House Unveils Road Map to Fix BGP
5 months 1 week ago
The White House Office of the National Cyber Director released a plan outlining steps network operators and service providers need to take to secure BGP from abuse and configuration errors.
Dark Reading Staff
From Threats to Trends: Highlights from Perception Point’s H1 2024 Report
5 months 1 week ago
In the first half of 2024, the cyber attacks targeting employees increased by 24% per user. Sec
Red team tool ‘MacroPack’ abused in attacks to deploy Brute Ratel
5 months 1 week ago
The MacroPack framework, initially designed for Red Team exercises, is being abused by threat actors to deploy malicious payloads, including Havoc, Brute Ratel, and PhatomCore. [...]
Bill Toulas
CVE-2024-45399 | Indico up to 3.3.3 next cross site scripting (GHSA-rrqf-w74j-24ff)
5 months 1 week ago
A vulnerability, which was classified as problematic, was found in Indico up to 3.3.3. Affected is an unknown function. The manipulation of the argument next leads to cross site scripting.
This vulnerability is traded as CVE-2024-45399. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-45001 | Linux Kernel up to 6.6.47/6.10.6 napi_build_skb buffer overflow (65f20b174ec0/e6bea6a45f8a/32316f676b4e)
5 months 1 week ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.47/6.10.6. This issue affects the function napi_build_skb. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-45001. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com