Security News

SolarWinds Web Help Desk flaw is now exploited in attacks
2024-10-16 19:53

CISA has added three flaws to its 'Known Exploited Vulnerabilities' (KEV) catalog, among which is a critical hardcoded credentials flaw in SolarWinds Web Help Desk (WHD) that the vendor fixed in...

Understand these seven password attacks and how to stop them
2024-10-16 14:01

Hackers are always looking for new ways to crack passwords and gain access to your organization's data and systems. In this post, Specops Software discusses the seven most common password attacks...

From Misuse to Abuse: AI Risks and Attacks
2024-10-16 11:25

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI:...

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
2024-10-16 07:20

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails....

EDRSilencer red team tool used in attacks to bypass security
2024-10-15 18:47

A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security tools and mute their alerts to management consoles. [...]

99% of UK Businesses Faced Cyber Attacks in the Last Year
2024-10-15 13:00

Nearly half of respondents blamed remote work for these incidents.

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)
2024-10-15 11:41

Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls – to its Known Exploited...

China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it
2024-10-15 01:15

Enough with the racist-sounding 'dragons' and 'pandas', Beijing complains – then points the finger at koalas Chinese authorities have published another set of allegations that assert the Volt...

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
2024-10-14 11:08

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply...

Crypto-apocalypse soon? Chinese researchers find a potential quantum attack on classical encryption
2024-10-14 06:30

With an off-the-shelf D-Wave machine Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.…