Security News

EDRSilencer red team tool used in attacks to bypass security
2024-10-15 18:47

A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security tools and mute their alerts to management consoles. [...]

99% of UK Businesses Faced Cyber Attacks in the Last Year
2024-10-15 13:00

Nearly half of respondents blamed remote work for these incidents.

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)
2024-10-15 11:41

Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls – to its Known Exploited...

China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it
2024-10-15 01:15

Enough with the racist-sounding 'dragons' and 'pandas', Beijing complains – then points the finger at koalas Chinese authorities have published another set of allegations that assert the Volt...

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
2024-10-14 11:08

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply...

Crypto-apocalypse soon? Chinese researchers find a potential quantum attack on classical encryption
2024-10-14 06:30

With an off-the-shelf D-Wave machine Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.…

CISOs’ strategies for managing a growing attack surface
2024-10-14 04:00

In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson...

Schools bombarded by nation-state attacks, ransomware gangs, and everyone in between
2024-10-13 13:00

Reading, writing, and cyber mayhem, amirite? If we were to draw an infosec Venn diagram, with one circle representing "sensitive info that attackers would want to steal" and the other "limited...

GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks
2024-10-11 17:13

A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver...

Casio confirms customer data stolen in a ransomware attack
2024-10-11 14:46

Casio now confirms it suffered a ransomware attack earlier this month, warning that the personal and confidential data of employees, job candidates, and some customers was also stolen. [...]