Tag: tool
-
For Russian spies, existing cybercrime tools become avenues into Ukrainian military devices
by
in SecurityNewsA Kremlin-backed group tracked as Secret Blizzard or Turla recently used existing cybercrime infrastructure for an espionage campaign aimed at Ukrainian military devices.]]> First seen on therecord.media Jump to article: therecord.media/turla-secret-blizzard-russia-espionage-ukraine-cybercrime-tools
-
ConvoC2 A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams
by
in SecurityNewsA stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute system commands on compromised hosts remotely. This innovative project, designed with Red Team operations in mind, uses Teams messages for hidden data exfiltration and command execution, demonstrating a significant security challenge for organizations relying on…
-
Lookout Discovers New Spyware Deployed by Russia and China
by
in SecurityNewsRussian-made spyware BoneSpy and PlainGnome target former Soviet states, while public security bureaus in mainland China use Chinese surveillance tool EagleMsgSpy First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/lookout-new-spyware-russia-china/
-
Europol Shutsdown 27 DDoS Service Provider Platforms
by
in SecurityNewsIn a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27 illegal platforms facilitating Distributed Denial-of-Service (DDoS) attacks. This takedown marks a significant blow to the cybercrime industry, disrupting one of the most common tools cybercriminals use to cause widespread disruption. These platforms, known as ‘booter’…
-
Google Gemini 2.0 Introduced With Advanced AI for Developers
by
in SecurityNewsMultimodal Agentic AI Delivers Speed, Tools, and Research Prototypes. Google’s latest AI model can natively process and output text, images and audio in the search giant’s push toward more autonomous reasoning, planning and action. The company said Gemini 2.0 is designed for applications ranging from development and gaming to research and everyday assistance. First seen…
-
Attackers can abuse the Windows UI Automation framework to steal data from apps
by
in SecurityNewsAn accessibility feature built into Windows to facilitate the use of computers by people with disabilities can be abused by malware to steal data from other applications or control them in malicious ways that evades detection by most endpoint protection systems.The Windows UI Automation framework has existed since the days of Windows XP and provides…
-
AI Meets Fraud Prevention in LexisNexis-IDVerse Acquisition
by
in SecurityNewsLexisNexis Combines AI-Driven Document Authentication With Its Fraud Solutions. To counter AI-driven fraud, LexisNexis acquired IDVerse, a London-based startup focused on document authentication and regulatory compliance. This acquisition aims to seamlessly integrate advanced tools into LexisNexis’ fraud and identity platforms, enhancing global operations. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-meets-fraud-prevention-in-lexisnexis-idverse-acquisition-a-27032
-
The imperative for governments to leverage genAI in cyber defense
by
in SecurityNews
Tags: ai, attack, cyber, cyberattack, cybersecurity, dark-web, data, deep-fake, defense, detection, email, endpoint, gartner, government, incident response, infrastructure, intelligence, LLM, malicious, malware, microsoft, strategy, tactics, threat, tool, training, vulnerabilityIn an era where cyber threats are evolving at an unprecedented pace, the need for robust cyber defense mechanisms has never been more critical. Sixty-two percent of all cyberattacks focus on public sector organizations directly and indirectly. Nation-state actors, equipped with generative artificial intelligence (genAI) sophisticated tools and techniques, pose significant threats to national security,…
-
Chinese provincial security teams used spyware to collect texts, audio recordings
by
in SecurityNewsThe researchers said development of the EagleMsgSpy tool has continued throughout 2024, with the company behind it adding new capabilities and obfuscation features. ]]> First seen on therecord.media Jump to article: therecord.media/chinese-provincial-security-teams-use-spyware-collect-texts-location
-
US sanctions Chinese cybersecurity firm over global malware campaign
by
in SecurityNews
Tags: attack, breach, china, computer, control, corporate, credentials, cve, cyber, cyberattack, cybersecurity, email, encryption, exploit, finance, firewall, fraud, government, group, healthcare, identity, infection, infrastructure, intelligence, international, malicious, malware, monitoring, network, office, password, ransomware, risk, service, software, sophos, technology, terrorism, threat, tool, vulnerability, zero-dayThe US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one of its employees, Guan Tianfeng, for their alleged involvement in a 2020 global cyberattack that exploited zero day vulnerabilities in firewalls.The actions were announced by the US Department of the Treasury and the Department of Justice (DOJ), which also…
-
Attackers exploit zero-day RCE flaw in Cleo managed file transfer
by
in SecurityNews
Tags: advisory, attack, cve, edr, exploit, firewall, flaw, group, Internet, malicious, mitigation, moveIT, powershell, ransomware, rce, remote-code-execution, software, tool, update, vulnerability, vulnerability-management, windows, zero-daySecurity researchers have warned about in-the-wild attacks that exploit a remote code execution vulnerability in managed file transfer (MFT) solutions developed by enterprise software vendor Cleo Communications.The impacted products include the latest versions of Cleo LexiCom, Cleo VLTrader and Cleo Harmony, with experts advising to temporarily disconnect these systems from the internet until a patch…
-
Black Hat: Latest news and insights
by
in SecurityNewsThe infosecurity world decamps to London this week, with research on vulnerabilities in AI systems at the fore of the latest edition of Black Hat Europe.The four-day program runs from Dec. 9-12, with two-and four-day options of hands-on trainings, but the main event at ExCeL London occurs on Dec. 11 and 12 featuring the latest research, developments,…
-
Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight
by
in SecurityNews
Tags: access, ai, application-security, attack, authentication, backdoor, best-practice, computer, conference, control, cybercrime, cybersecurity, data, dns, encryption, exploit, finance, github, government, hacker, healthcare, identity, injection, Internet, LLM, malicious, microsoft, mitigation, office, open-source, radius, RedTeam, risk, service, sophos, technology, tool, training, vulnerability, vulnerability-management, windowsThis week in London Black Hat Europe will feature a diverse range of talks and presentations covering the latest developments in cybersecurity.The opening keynote on Wednesday will be delivered by Frédérick Douzet, a professor of geopolitics at the University of Paris 8, and director of the French Institute of Geopolitics research team. No preview is…
-
SPA is for Single-Page Abuse! Using Single-Page Application Tokens to Enumerate Azure
by
in SecurityNewsAuthor: Lance B. Cain Overview Microsoft Azure is a leading cloud provider offering technology solutions to companies, governments, and other organizations around the globe. As such, many entitles have begun adopting Azure for their technology needs to include identity, authentication, storage, application management, and web services. One of the most common methods for organizations to begin…
-
Credit risk rising as attackers strike larger companies: Moody’s
by
in SecurityNewsCybercriminals are deploying generative AI tools in their efforts at ransomware and fraud, Moody’s Ratings said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/credit-risk-cyber-moodys/735066/
-
Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises
by
in SecurityNewsCVE-2024-50623, an improperly patched vulnerability affecting Cleo file transfer tools, has been exploited in the wild. The post Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cleo-file-transfer-tool-vulnerability-exploited-in-wild-against-enterprises/
-
RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
by
in SecurityNewsAttackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate, and targets entrepreneurs automating business processes and aims to compromise their systems. They are distributing malicious activators on forums targeting business owners and accountants, deceptively promoting them as legitimate license bypass tools with update functionality…
-
Google Launches Open Source Patch Validation Tool
by
in SecurityNewsVanir automates the process of scanning source code to identify what security patches are missing. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/google-open-source-patch-validation-tool
-
Cisco Says Flaws in Industrial Routers, BGP Tool Remain Unpatched 8 Months After Disclosure
by
in SecurityNewsCisco Talos has disclosed the details of apparently unpatched vulnerabilities in MC Technologies industrial routers and the GoCast BGP tool. The post Cisco Says Flaws in Industrial Routers, BGP Tool Remain Unpatched 8 Months After Disclosure appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cisco-says-flaws-in-industrial-routers-bgp-tool-remain-unpatched-8-months-after-disclosure/
-
Zukunft schenken und die Hacker School unterstützen
Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres Arbeitens und unseres Lebens beeinflussen, gehören digitale Skills einfach dazu. Es geht um Programmieren, Future Skills, KI-Kompetenz und IT-Berufsorientierung für die nächste Generation. Deshalb macht digitale Bildung den Unterschied. Seit über zehn Jahren engagiert sich die Hacker School für digitale…
-
Hackers are exploiting a flaw in popular file-transfer tools to launch mass hacks, again
by
in SecurityNewsThreat actors are exploiting a high-risk bug in Cleo software – and Huntress warns that fully-patched systems are vulnerable First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/10/hackers-are-exploiting-a-flaw-in-popular-file-transfer-tools-to-launch-mass-hacks-again/
-
21 years since its inception, GNU Shepherd 1.0.0 is released
by
in SecurityNewsGNU Shepherd is a service manager designed to oversee the system’s daemons. It functions both as an >>init
-
Strengthening security posture with comprehensive cybersecurity assessments
by
in SecurityNewsIn this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/10/phani-dasari-hgs-cybersecurity-assessments/
-
EDR-Software ein Kaufratgeber
by
in SecurityNews
Tags: ai, android, api, backup, browser, chrome, cloud, computing, crowdstrike, cyberattack, detection, edr, endpoint, firewall, identity, incident response, intelligence, iot, kubernetes, linux, macOS, mail, malware, microsoft, network, ransomware, risk, siem, soar, software, sophos, threat, tool, windows, zero-day -
SpyNote RAT Targets High-Value Individuals in Southern Asia
by
in SecurityNewsCybersecurity researchers at CYFIRMA have uncovered a sophisticated cyberattack targeting high-value individuals in Southern Asia. Leveraging the SpyNote Remote Administration Tool (RAT), an unknown threat actor designed a malicious Android... First seen on securityonline.info Jump to article: securityonline.info/spynote-rat-targets-high-value-individuals-in-southern-asia/
-
Google Launches Open-Source Patch Validation Tool
by
in SecurityNewsVanir automates the process of scanning source code to identify what security patches are missing. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/google-open-source-patch-validation-tool