Security News

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
2024-03-29 12:12

A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called...

The Golden Age of Automated Penetration Testing is Here
2024-03-29 11:19

Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it...

Lessons from a Ransomware Attack against the British Library
2024-03-29 11:03

You might think that libraries are kind of boring, but this self-analysis of a 2023 ransomware and extortion attack against the British Library is anything but. Carl Engelbrecht March 29, 2024 7:53 AM. Why do technologists who know better continue to propagate the erroneous statement "Ransomware attacks".

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
2024-03-29 10:49

Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the...

How much does cloud-based identity expand your attack surface?
2024-03-29 06:00

We all know using a cloud-based identity provider expands your attack surface, but just how big does that attack surface get? And can we even know for sure? The first step towards mitigating the expanded attack surface in the cloud is recognizing the risks and potential vulnerabilities of cloud identity providers.

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
2024-03-29 05:37

The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign....

AI abuse and misinformation campaigns threaten financial institutions
2024-03-29 05:30

Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration. That said, threat actors can use generative AI to write malware and more skilled cybercriminals could exfiltrate information from or inject contaminated data into the large language models that train GenAI. The use of corrupted GenAI outputs can expose financial institutions to severe legal, reputational, or operational consequences.

Advanced cybersecurity strategies boost shareholder returns
2024-03-29 05:00

Companies demonstrating advanced cybersecurity performance generate a shareholder return that is 372% higher than their peers with basic cybersecurity performance, according to a new report from Diligent and Bitsight. The report also reveals that highly regulated industries, such as healthcare and financial services, have the highest cybersecurity ratings, and companies with either a specialized risk committee or audit committee achieve better cybersecurity performance compared to those with neither, with ratings of 710 and 650 respectively.

Finding software flaws early in the development process provides ROI
2024-03-29 04:30

The Consortium for Information and Software Quality estimates that the cost of poor software quality in the United States reached $2.41 trillion in 2022. It's also completely avoidable, and software flaws must be avoided with the world's increased dependency on software.

Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords
2024-03-28 21:03

A vulnerability in the wall command of the util-linux package that is part of the Linux operating system could allow an unprivileged attacker to steal passwords or change the victim's clipboard. WallEscape impacts the 'wall' command, which is typically used in Linux systems to broadcast messages to the terminals of all users logged to the same system, such as a server.