Security News

Data firm execs convicted for helping fraudsters target the elderly
2024-06-03 22:37

A former senior executive and former sales manager of Epsilon Data Management LLC were convicted of selling data of millions of Americans to perpetrators of mail fraud schemes. As announced late last week by the U.S. Department of Justice, the two men, Robert Reger and David Lytle, were found guilty of conspiracy and multiple counts of mail and wire fraud for their roles in a scheme that provided targeted consumer lists to fraudsters over a decade.

Microsoft India’s X account hijacked in Roaring Kitty crypto scam
2024-06-03 22:30

The official Microsoft India account on Twitter, with over 211,000 followers, was hijacked by cryptocurrency scammers to impersonate Roaring Kitty, the handle used by notorious meme stock trader Keith Gill. Microsoft India's X account has a gold check as an officially verified organization on the platform, lending the hijackers' posts more legitimacy.

NIST turns to IT consultants to clear National Vulnerability Database backlog
2024-06-03 21:46

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Cox fixed an API auth bypass exposing millions of modems to attacks
2024-06-03 21:10

Cox Communications has fixed an authorization bypass vulnerability that enabled remote attackers to abuse exposed backend APIs to reset millions of modems' settings and steal customers' sensitive personal information. The attackers could've used this access to exploit any of the millions of Cox devices accessible through the vulnerable Cox APIs, overwriting configuration settings and executing commands on the device.

361 million stolen accounts leaked on Telegram added to HIBP
2024-06-03 19:47

A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check if their accounts have been compromised. Cybersecurity researchers collected these credentials from numerous Telegram cybercrime channels, where the stolen data is commonly leaked to the channel's users to build reputation and subscribers.

Crooks threaten to leak 3B personal records 'stolen from background check firm'
2024-06-03 19:36

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Azure Service Tags tagged as security risk, Microsoft disagrees
2024-06-03 18:55

Security researchers at Tenable discovered what they describe as a high-severity vulnerability in Azure Service Tag that could allow attackers to access customers' private data. Service Tags are groups of IP addresses for a specific Azure service used for firewall filtering and IP-based Access Control Lists when network isolation is needed to safeguard Azure resources.

Exploit for critical Progress Telerik auth bypass released, patch now
2024-06-03 17:58

Researchers have published a proof-of-concept exploit script demonstrating a chained remote code execution vulnerability on Progress Telerik Report Servers. Cybersecurity researcher Sina Kheirkha developed the exploit with the help of Soroush Dalili and has now published a detailed write-up that describes the intricate process of exploiting two flaws, an authentication bypass and a deserialization issue, to execute code on the target.

How to Start a Career in Cybersecurity
2024-06-03 16:00

Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline Clarke for TechRepublic Premium, highlights the methods people can take to begin a career in cybersecurity, provides expert insights from industry professionals and discusses the varying factors surrounding this lucrative area of professional advancement.

Verizon users report blurry photos in Android messaging apps
2024-06-03 15:37

Verizon customers using Android phones report that they receive blurry images through text messages on different services and apps, with no response from Verizon as to why. Some report that the blurry photos problem on Verizon started in February 2024, but user reports escalated in May following a recent software update from their vendors.