AttackFeed Cybersecurity News

0

6 Mistakes Organizations Make When Deploying Advanced Authentication – [email protected] (The Hacker News)

– Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying  – Read More  – The Hacker News 

0

How DDR Can Bolster Your Security Posture – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Today’s threat landscape is as dangerous as it has ever been. Global unrest, emerging technologies, and economic downturn all contribute to persistently high cybercrime rates and...

0

How DDR Can Bolster Your Security Posture – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Today’s threat landscape is as dangerous as it has ever been. Global unrest, emerging technologies, and economic downturn all contribute to persistently high cybercrime rates and...

0

Black Basta ransomware group’s techniques evolve, as FBI issues new warning in wake of hospital attack – Graham Cluley

– [[{“value”:”Security agencies in the United States have issued a new warning about the Black Basta ransomware group, in the wake of a high-profile attack against the healthcare giant Ascension. The cyber attack last week forced the Ascension computer systems offline, and caused some hospital emergency departments to turn away ambulances “in order to ensure emergency cases are triaged immediately.”...

0

Black Basta ransomware group’s techniques evolve, as FBI issues new warning in wake of hospital attack – Graham Cluley

– [[{“value”:”Security agencies in the United States have issued a new warning about the Black Basta ransomware group, in the wake of a high-profile attack against the healthcare giant Ascension. The cyber attack last week forced the Ascension computer systems offline, and caused some hospital emergency departments to turn away ambulances “in order to ensure emergency cases are triaged immediately.”...

0

CISA and Partners Release Guidance for Civil Society Organizations on Mitigating Cyber Threats with Limited Resources – CISA

[[{“value”:” CISA, in partnership with the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI) and international partners, released Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society. The joint guidance provides civil society organizations and individuals with recommended actions and mitigations to reduce the risk of cyber intrusions. Additionally, the guide encourages software manufactures to actively...

0

CISA and Partners Release Guidance for Civil Society Organizations on Mitigating Cyber Threats with Limited Resources – CISA

[[{“value”:” CISA, in partnership with the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI) and international partners, released Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society. The joint guidance provides civil society organizations and individuals with recommended actions and mitigations to reduce the risk of cyber intrusions. Additionally, the guide encourages software manufactures to actively...

0

Sophos Incident Response achieves NCSC Certified Incident Response (CIR) Level 2 status – Sally Adam

– I am delighted to announce that the Sophos Incident Response service has been awarded U.K.’s National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 status by CREST. This assurance confirms that amid the sophisticated cybersecurity threat landscape, Sophos has the experience and capabilities to deal with incidents caused by financially motivated criminals, such […]  – Read More ...

0

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices – [email protected] (The Hacker News)

– [[{“value”:”Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. “This will help mitigate the misuse of devices designed to help keep track of belongings,” the companies said in...

0

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution –

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete...

0

Future of eCommerce: Emerging Technologies Shaping Online Retail in 2024 – Uzair Amir

– [[{“value”:” By Uzair Amir Top-notch stores are moving online as eCommerce continues to lead with breakthrough innovations that are transforming global business… This is a post from HackRead.com Read the original post: Future of eCommerce: Emerging Technologies Shaping Online Retail in 2024 “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Police Accessed Proton Mail User Data in Terrorism Probe – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Encrypted email services like ProtonMail and Wire promise privacy, but can they guarantee anonymity? A recent case in Spain has users questioning the limitations of encryption when law enforcement steps in. This is a post from HackRead.com Read the original post: Police Accessed Proton Mail User Data in Terrorism Probe “}]]  – Read More  –...

0

Ransomware used in attack that disrupted US hospitals  – AJ Vicens

– [[{“value”:” A cyberattack that disrupted operations at one of the United States’s largest health care systems last week was carried out using ransomware, the company that was targeted said on Saturday.  Ascension operates 140 hospitals across 19 states and the District of Columbia and said in a statement on its website that the company is “in close contact” with...

0

Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed – Waqas

– [[{“value”:” By Waqas Millions of IoT and industrial devices at risk! Critical vulnerabilities in Cinterion cellular modems allow remote attackers to take control. This is a post from HackRead.com Read the original post: Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Bipartisan House bill aims to prepare election workers for AI – mbracken

– [[{“value”:” Ahead of a Senate markup this week on a trio of bills governing artificial intelligence in elections, a bipartisan group of House lawmakers on Monday introduced companion legislation aimed at preparing election administrators for challenges posed by the technology. The Preparing Election Administrators for AI Act from Reps. Chrissy Houlahan, D-Pa., Brian Fitzpatrick, R-Pa., Abigail Spanberger, D-Va., and...

0

Logicalis enhances global security services with the launch of Intelligent Security – Cyber Newswire

– [[{“value”:” By Cyber Newswire London, United Kingdom, May 13th, 2024, CyberNewsWire Logicalis, the global technology service provider delivering next-generation digital managed services,… This is a post from HackRead.com Read the original post: Logicalis enhances global security services with the launch of Intelligent Security “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence – cybernewswire

– [[{“value”:” By cybernewswire Torrance, California, May 13th, 2024, CyberNewsWire Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by… This is a post from HackRead.com Read the original post: Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices – [email protected] (The Hacker News)

– [[{“value”:”The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the non-profit said”}]]  – Read More  – The Hacker News 

0

CISA Adds One Known Exploited Vulnerability to Catalog – CISA

[[{“value”:” CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-4671 Google Chromium in Visuals Use-After-Free Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known...

0

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield – [email protected] (The Hacker News)

– [[{“value”:”With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture”}]]  – Read More  – The Hacker News 

0

Surfshark VPN Brings Data Breach Awareness with See-Through Toilet Campaign – Waqas

– [[{“value”:” By Waqas Surfshark pulls a unique stunt in London with a see-through toilet! This security campaign uses public discomfort to spark a conversation about online data privacy. Learn how Surfshark VPN can help you protect your information. This is a post from HackRead.com Read the original post: Surfshark VPN Brings Data Breach Awareness with See-Through Toilet Campaign “}]] ...

0

How Did Authorities Identify the Alleged Lockbit Boss? – BrianKrebs

– [[{“value”:” Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit’s leader “LockBitSupp” claims the feds named the wrong guy, saying the charges don’t explain how they connected him to Khoroshev. This post examines the activities of Khoroshev’s...

0

2024 RSA Recap: Allow us to Reintroduce Ourselves – [email protected]

– [[{“value”:” The 2024 RSA Conference has officially wrapped, and this year’s event served as the perfect backdrop for us to make our re-introduction to the industry. Introducing LevelBlue, the Trusted Cybersecurity Advisors On day one of RSA, we officially announced the launch of LevelBlue, formerly known as AT&T Cybersecurity. Signifying an exciting new start for the company, I was...

0

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia – [email protected] (The Hacker News)

– [[{“value”:”The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS”}]]  – Read More ...

0

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. “These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT”}]]  – Read More  – The Hacker News 

0

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike – [email protected] (The Hacker News)

– [[{“value”:”In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives  Analysts”}]]  – Read...

0

US, China meeting this week to talk AI safety, risks – mbracken

– [[{“value”:” The United States and the People’s Republic of China will meet in Geneva on Tuesday to discuss ways to manage societal risks around artificial intelligence, as the two superpowers mull whether and how to restrict the use of a technology that both consider essential to their national and economic futures. The meetings were agreed to as part of...

0

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been”}]]  – Read More  – The Hacker News 

0

Latvian TV Channels Hacked to Broadcast Russian Victory Day Parade – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Confused Latvians woke up to the Russian Victory Day parade on their TVs! Hackers targeted a content delivery network to manipulate broadcasts exposing media supply chain vulnerabilities. This is a post from HackRead.com Read the original post: Latvian TV Channels Hacked to Broadcast Russian Victory Day Parade “}]]  – Read More  – Hackread – Latest...

0

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT – [email protected] (The Hacker News)

– [[{“value”:”The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall”}]]  – Read More  – The Hacker News 

0

Wild Wisdom: What Technology Learns from the Natural World – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  As a high school student interested in exploring the connection between technology and nature, I was curious to find out how the natural world inspires modern...

0

Europol Hacked? IntelBroker Claims Major Law Enforcement Breach – Waqas

– [[{“value”:” By Waqas Notorious hacker IntelBroker claims a major data breach at Europol. Allegedly, sensitive data including employee info, source code, and operational documents were compromised. Europol has yet to confirm the breach. Could this expose ongoing investigations and endanger law enforcement personnel? Find out more. This is a post from HackRead.com Read the original post: Europol Hacked? IntelBroker...

0

New LLMjacking Attack Lets Hackers Hijack AI Models for Profit – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Researchers uncover a novel cyberattack scheme called “LLMjacking” exploiting stolen cloud credentials to hijack powerful AI models. This article explores the implications of attackers leveraging large language models (LLMs) for malicious purposes and offers security recommendations for the cloud and AI communities. This is a post from HackRead.com Read the original post: New LLMjacking Attack...

0

Forget AI: Physical threats are biggest risk facing the 2024 election – djohnson

– [[{“value”:” SAN FRANCISCO — 2024 could turn out to be the year in which artificial intelligence upends the U.S. election, but at America’s largest cybersecurity conference, federal officials charged with protecting the vote said they are most concerned with a far more analog threat: physical violence directed at election administrators.  While many election officials are concerned about issues of...

0

#StopRansomware: Black Basta – CISA

[[ Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor”>1],[2] Exfiltration and Encryption Black Basta affiliates use RClone to facilitate data exfiltration prior to encryption. Prior to exfiltration, cybersecurity researchers have observed Black Basta affiliates using PowerShell [T1059.001] to disable antivirus products, and in some instances, deploying a tool called Backstab, designed to disable endpoint detection and response (EDR)...

0

CISA and Partners Release Advisory on Black Basta Ransomware – CISA

[[{“value”:” Today, CISA, in partnership with the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released joint Cybersecurity Advisory (CSA) #StopRansomware: Black Basta to provide cybersecurity defenders tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) used by known Black Basta ransomware affiliates and identified...

0

House panel leaders call on Microsoft president to testify over security shortcomings – Tim Starks

– [[{“value”:” Leaders of the House Homeland Security Committee want Microsoft President Brad Smith to testify before their panel in the aftermath of accumulating cybersecurity incidents that have drawn ample negative attention to the tech giant. In particular, the committee is zeroing in on a Cyber Safety Review Board report that faulted Microsoft for “a cascade of security failures” that...

0

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms – [email protected] (The Hacker News)

– [[{“value”:”The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at South Korean cryptocurrency firms. “Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,” Kaspersky&”}]]  – Read More  – The Hacker News