Tag: tool
-
Microsoft accuses group of developing tool to abuse its AI service in new lawsuit
Microsoft has taken legal action against a group the company claims intentionally developed and used tools to bypass the safety guardrails of its cloud AI products. According to a complaint filed by the company in December in the U.S. District Court for the Eastern District of Virginia, a group of 10 unnamed defendants allegedly used…
-
New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)
by
in SecurityNewsAfter a long, long, long writing effort “¦ eh “¦ break, we are ready with our 5th Deloitte and Google Cloud Future of the SOC paper “Future of SOC: Transform the ‘How’.” As a reminder (and I promise you do need it; it has been years”¦), the previous 4 papers are: “New Paper: “Future of the SOC: Evolution or…
-
Malware targets Mac users by using Apple’s security tool
by
in SecurityNewsA variant of the Banshee macOS infostealer was seen duping detection systems with new string encryption copied from Apple’s in-house algorithm.A Check Point research, which caught the variant after two months of successful evasion, said threat actors distributed Banshee using phishing websites and fake GitHub repositories, often impersonating popular software like Google Chrome, Telegram, and…
-
Weaponized LDAP Exploit Deploys Information-Stealing Malware
by
in SecurityNewsCybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept exploits for CVE-2024-49113 (dubbed >>LDAPNightmare
-
Ivanti zero-day exploited by APT group that previously targeted Connect Secure appliances
by
in SecurityNewsResearchers from Google’s Mandiant division believe the critical remote code execution vulnerability patched on Wednesday by software vendor Ivanti has been exploited since mid-December by a Chinese cyberespionage group. This is the same group that has exploited zero-day vulnerabilities in Ivanti Connect Secure appliances back in January 2024 and throughout the year.The latest attacks, exploiting…
-
Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware
In-the-wild attacks tamper with built-in security tool to suppress infection warnings. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/01/ivanti-vpn-users-are-getting-hacked-by-actors-exploiting-a-critical-vulnerability/
-
Smashing Security podcast #399: Honey in hot water, and reset your devices
by
in SecurityNewsEver wonder how those “free” browser extensions that promise to save you money actually work? We dive deep into the controversial world of Honey, the coupon-finding tool owned by PayPal, and uncover a scheme that might be leaving you with less savings and your favorite YouTubers with empty pockets. First seen on grahamcluley.com Jump to…
-
Escape vs Probely (acquired by Snyk)
by
in SecurityNews
Tags: toolDiscover the differences between these tools for Application Discovery and DAST. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/escape-vs-probely-acquired-by-snyk/
-
WatchGuard Strengthens MDR Services With ActZero Acquisition
by
in SecurityNewsActZero Purchase Adds Artificial Intelligence, Open Platform and Process Maturity. With its acquisition of ActZero, WatchGuard gains advanced machine learning capabilities and expertise to improve its MDR service. ActZero’s mature processes and open platform enable seamless integration of WatchGuard products as well as third-party tools like Microsoft Defender. First seen on govinfosecurity.com Jump to article:…
-
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
by
in SecurityNewsPalo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data.”Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create…
-
Criminal IP: Bringing Real-Time Phishing Detection to Microsoft Outlook
AI SPERA announced today that it launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. Learn more about how this tool provides real-time phishing email detection and URL blocking for Microsoft Outlook. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/criminal-ip-bringing-real-time-phishing-detection-to-microsoft-outlook/
-
Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace
by
in SecurityNewsTorrance, United States / California, 9th January 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/criminal-ip-launches-real-time-phishing-detection-tool-on-microsoft-marketplace/
-
APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub
by
in SecurityNewsThe malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a sophisticated attack that compromises the privacy of cybersecurity professionals. A recent investigation by the ThreatBook Research and Response Team revealed that a popular privilege escalation tool utilized by cybersecurity experts had been backdoored, leading to significant data breaches and identity…
-
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool
by
in SecurityNewsPalo Alto Networks has released patches for multiple vulnerabilities in the Expedition migration tool, which was retired on December 31, 2024. The post Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
by
in SecurityNews
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Wireshark 4.4.3 Released: What’s New!
by
in SecurityNewsThe Wireshark development team announced the release of Wireshark version 4.4.3, a critical update that brings several bug fixes and enhancements to this widely used network protocol analyzer. Renowned for its ability to troubleshoot, analyze, and educate users about network protocols, Wireshark continues to evolve, making it an indispensable tool for network professionals. Key Bug…
-
Lerntrends für 2025 GenAIKompetenz meistgefragte Fähigkeit
by
in SecurityNewsDoppelt so hohes GenAI-Interesse in Deutschland wie im Vorjahr (gemessen an Top-10-Kursen). Vier Cybersicherheitskurse unter den zehn weltweit am schnellsten wachsenden Skills. Weiterbildende investieren massiv in GenAI. Doch welche Schwerpunkte setzen Beschäftigte, Jobsuchende und Studierende dabei? Was sind die aktuell gefragtesten Kurse und Fähigkeiten in Deutschland und weltweit? Das analysiert der jährliche »Job Skills… First…
-
Sara: Open-source RouterOS security inspector
by
in SecurityNewsSara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/09/sara-open-source-routeros-security-inspector/
-
Ivanti warns critical RCE flaw in Connect Secure exploited as zero-day
by
in SecurityNews
Tags: advisory, apt, attack, authentication, cve, cvss, cybersecurity, data-breach, exploit, flaw, google, government, group, intelligence, Internet, ivanti, law, mandiant, microsoft, network, rce, remote-code-execution, risk, software, threat, tool, vpn, vulnerability, zero-dayIT software provider Ivanti released patches Wednesday for its Connect Secure SSL VPN appliances to address two memory corruption vulnerabilities, one of which has already been exploited in the wild as a zero-day to compromise devices.The exploited vulnerability, tracked as CVE-2025-0282, is a stack-based buffer overflow rated as critical with a CVSS score of 9.0.…
-
CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild
by
in SecurityNews
Tags: access, advisory, attack, authentication, cve, exploit, flaw, group, injection, ivanti, malware, ransomware, remote-code-execution, threat, tool, update, vulnerability, zero-day, zero-trustIvanti disclosed two vulnerabilities in its Connect Secure, Policy Secure and Neurons for ZTA gateway devices, including one flaw that was exploited in the wild as a zero-day. Background On January 8, Ivanti published a security advisory for two vulnerabilities affecting multiple products including Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for Zero…
-
Meet the WAF Squad – Impart Security
by
in SecurityNewsIntroduction Web applications and APIs are critical parts of your attack surface, but managing WAFs has never been easy. False positives, rule tuning, risks of production outages, and log analysis – all of this work has made WAF historically difficult to operationalize. Well, that time is over. Meet Impart’s WAF Squad – a five-member squad…
-
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim. First seen on hackread.com Jump to article: hackread.com/paypal-phishing-scam-exploits-ms365-genuine-emails/
-
Sophos stellt Sprachmodell-Tool zur Verfügung – Tuning-Tool für LLMs als Open-Source-Programm
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/sophosai-open-source-tool-large-language-models-a-7f503f54ce6f32d4c318a41e873e2a54/