Security News

Brute Force and Dictionary Attacks: A Guide for IT Leaders
2024-03-26 16:00

It's essential that cybersecurity professionals understand the risks associated with brute force attacks. Read this guide from TechRepublic Premium to find out what you need to know about this classic form of cybersecurity attack, how safe you may be and how to defend your systems against brute force attacks.

TheMoon malware infects 6,000 ASUS routers in 72 hours for proxy service
2024-03-26 15:00

A new variant of "TheMoon" malware botnet has been spotted infecting thousands of outdated small office and home office routers and IoT devices in 88 countries. Black Lotus Labs researchers monitoring the latest TheMoon campaign, which started in early March 2024, have observed 6,000 ASUS routers being targeted in under 72 hours.

6 Best Authenticator Apps for 2024
2024-03-26 14:28

Authenticator apps help individuals and organizations double-check user identity by using two-factor or multi-factor authentication to verify and authenticate user identities before granting access to them. In this article, we will review the best authenticator apps in 2024 and explore their features, pricing and pros and cons to help you decide the right authenticator app for your business.

Microsoft: 87% of UK Businesses Are Unprepared for Cyberattacks
2024-03-26 14:00

According to the report, titled Mission Critical: Unlocking the UK AI Opportunity Through Cybersecurity, cyberattacks currently cost the U.K. an estimated £87 billion each year. In a foreword to this new report, Microsoft UK CEO Claire Barclay said the U.K. could only meet its AI aspirations if businesses invested in cybersecurity processes and upgraded their security toolkits to match those of bad actors.

17,000+ Microsoft Exchange servers in Germany are vulnerable to attack, BSI warns
2024-03-26 13:26

Around 12% of the 45,000 or so Microsoft Exchange servers in Germany that can be accessed from the Internet without restrictions "Are so outdated that security updates are no longer offered for them," the German Federal Office for Information Security has warned today. The BSI worries about attackers breaching those servers by exploiting CVE-2024-21410, a critical elevation of privilege bug that allows attackers to learn a targeted user's NTLM credentials and "Relay" them to authenticate themselves to a vulnerable Exchange Server as the user.

Ransomware can mean life or death at hospitals. DEF CON hackers to the rescue?
2024-03-26 13:15

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

New GoFetch Vulnerability in Apple’s M Chips Allows Secret Keys Leak on Compromised Computers
2024-03-26 13:00

The newly exposed GoFetch vulnerability affecting Apple's M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. DMPs - in contrast to classical prefetchers that only store the memory access pattern - "Also take into account the contents of data memory directly to determine what to prefetch," as written in the publication from Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella and Daniel Genkin that reveals all of the details about the GoFetch vulnerability.

U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation
2024-03-26 12:06

The U.S. Department of Justice (DoJ) on Monday unsealed indictments against seven Chinese nationals for their involvement in a hacking group that targeted U.S. and foreign critics, journalists,...

Crafting Shields: Defending Minecraft Servers Against DDoS Attacks
2024-03-26 11:29

Minecraft, with over 500 million registered users and 166 million monthly players, faces significant risks from distributed denial-of-service (DDoS) attacks, threatening server functionality,...

On Secure Voting Systems
2024-03-26 11:08

Rew Appel shepherded a public comment-signed by twenty election cybersecurity experts, including myself-on best practices for ballot marking devices and vote tabulation. Hand-marked and hand-counted ballots remove the uncertainty introduced by use of electronic machinery and the ability of bad actors to exploit electronic vulnerabilities to remotely alter the results.