Security News

Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)
2024-05-08 13:23

Researchers have brought to light a new attack method - dubbed TunnelVision and uniquely identified as CVE-2024-3661 - that can be used to intercept and snoop on VPN users' traffic by attackers who are on the same local network. "Luckily, most users who use commercial VPNs are sending web traffic which is mostly HTTPS. HTTPS traffic looks like gibberish to attackers using TunnelVision, but they know who you are sending that gibberish to which can be an issue," the researchers noted.

Photos: RSA Conference 2024
2024-05-08 11:26

RSA Conference 2024 is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event.

UK opens investigation of MoD payroll contractor after confirming attack
2024-05-08 11:15

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

MITRE breach details reveal attackers’ successes and failures
2024-05-08 11:06

MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier than previously thought: on December 31, 2023. Tools and techniques used to breach MITRE. The attackers leveraged the Ivanti zero-days to gain access to the organization's research and prototyping network, from which they performed additional reconnaissance, moved into its VMware environment and exfitrated data.

Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
2024-05-08 10:58

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. "These enhancements aim to increase the...

The Fundamentals of Cloud Security Stress Testing
2024-05-08 10:58

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to...

Veeam fixes RCE flaw in backup management platform (CVE-2024-29212)
2024-05-08 09:06

Veeam has patched a high-severity vulnerability in Veeam Service Provider Console and is urging customers to implement the patch. Veeam Service Provider Console is a cloud platform used by managed services providers and enterprises to manage and monitor data backup operations.

Combatting Deepfakes in Australia: Content Credentials is the Start
2024-05-08 09:00

There is growing consensus on how to address the challenge of deepfakes in media and businesses, generated through technologies such as AI. Earlier this year, Google announced that it was joining the Coalition for Content Provenance and Authenticity as a steering committee member - other organisations in the C2PA include OpenAI, Adobe, Microsoft, AWS and the RIAA. With growing concern about AI misinformation and deepfakes, IT professionals will want to pay close attention to the work of this body, and particularly Content Credentials, as the industry formalises standards governing how visual and video data is managed. Content Credentials are a form of digital metadata that creators can attach to their content to ensure proper recognition and promote transparency.

Ten years since the first corp ransomware, Mikko Hyppönen sees no end in sight
2024-05-08 07:31

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Ten years since the first corp ransomware, Mikko Hyppönen sees no end in sight
2024-05-08 07:31

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.