Security News

6 Best Anonymous (No-Log) VPNs for 2024
2024-01-11 17:02

VPNs are primarily used to secure online traffic and help users remain anonymous to avoid targeted ads, hide their location or ensure the security and privacy of their personal data. Below are some of the key features to look for in an anonymous, no-log VPN. The differences between these will highlight how each VPN can suit your needs best on top of providing high quality security.

Mandiant's brute-forced X account exposes perils of skimping on 2FA
2024-01-11 17:00

Google-owned security house Mandiant's investigation into how its X account was taken over to push cryptocurrency scams concludes the "Likely" cause was a successful brute-force password attack. "Normally, 2FA would have mitigated this, but due to some team transitions and a change in X's 2FA policy, we were not adequately protected," it posted via its now recovered account.

Threat Actors Increasingly Abusing GitHub for Malicious Purposes
2024-01-11 15:28

The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to host and deliver malicious payloads and act as dead drop resolvers,...

Infoseccers think attackers backed by China are behind Ivanti zero-day exploits
2024-01-11 15:06

Security experts believe Chinese nation-state attackers are actively exploiting two zero-day vulnerabilities in security products made by Ivanti. Ivanti believes fewer than ten victims have been successfully attacked thus far, but according to a Shodan scan by Beaumont, the number of vulnerable gateways exposed to the internet is just north of 15,000.

Finland warns of Akira ransomware wiping NAS and tape backup devices
2024-01-11 15:01

The Finish National Cybersecurity Center is informing of increased Akira ransomware activity in December, targeting companies in the country and wiping backups. Wiping the backups amplifies the damage of the attack and allows the threat actor to put more pressure on the victim as they eliminate the option of restoring the data without paying a ransom.

New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems
2024-01-11 14:16

Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache OfBiz open-source Enterprise Resource Planning (ERP) system to...

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms
2024-01-11 14:00

A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems (CMS), and SaaS platforms such as Amazon Web Services (AWS),...

Pharmacies Giving Patient Records to Police without Warrants
2024-01-11 12:09

About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998.

Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272)
2024-01-11 11:56

Cisco has fixed a critical vulnerability in Cisco Unity Connection that could allow an unauthenticated attacker to upload arbitrary files and gain root privilege on the affected system.Cisco Unity Connection is a unified messaging and voicemail solution for email inbox, web browser, Cisco Jabber, Cisco Unified IP Phone, smartphone, and tablet.

There is a Ransomware Armageddon Coming for Us All
2024-01-11 11:43

Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising headline from 2023 is that ransomware again set new...