What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
kovrr.png 2023-11-28 00:00:00 Investigating the Risk of Compromised Credentials and Internet-Exposed Assets Explore the report revealing industries and company sizes with the highest rates of compromised credentials and internet-exposed assets. Read More (lien direct) IntroductionIn this report, Kovrr collected and analyzed data to better understand one of the most common initial access vectors (1) - the use of compromised credentials (Valid Accounts - T1078) (2) to access internet-exposed assets (External Remote Services - T113) (3). The toxic combination of these two initial access vectors can allow malicious actors to gain a foothold in company networks before moving on to the next stage of their attack, which can be data theft, ransomware, denial of service, or any other action. There are numerous examples of breaches perpetrated by many attack groups that have occurred using this combination, for example, breaches by Lapsus (4) and APT39 (5), among others. ‍This report seeks to demonstrate which industries and company sizes have the highest percentage of compromised credentials and number of internet-exposed assets and face a higher risk of having their networks breached by the toxic combination of the initial access vectors mentioned above.‍It should be noted that having an asset exposed to the internet does not inherently pose a risk or indicate that a company has poor security. In our highly digitized world, companies are required to expose services to the internet so their services can be accessed by customers, vendors, and remote employees. These services include VPN servers, SaaS applications developed by the company, databases, and shared storage units. However, there are some common cases when having an asset exposed to the internet can be extremely risky, for example:‍When a company unintentionally exposes an asset due to misconfiguration.When a malicious third party obtains compromised credentials of a legitimate third party and accesses an exposed asset.  ‍To limit unnecessary internet exposure, companies should employ the following possible mitigations:‍Use Multi-Factor Authentication (MFA) for any services or assets that require a connection so that compromised credentials on their own will not be enough to breach an exposed asset.Limit access to the asset to only specific accounts, domains, and/or IP ranges.Segment the internal company network and isolate critical areas so that even if a network is breached through access to an external asset, attackers will not be able to use that access to reach wider or more sensitive areas of the company network. ‍Summary‍The following are the main findings from the collected data:‍The Services industry is by far the most exposed to attackers. Companies from that industry have the highest percentage of compromised credentials (74%). However, they have a relatively low amount of internet-exposed assets per company (34%). However, given that an average cyber loss in this industry has been shown to be about $45M, this is highly concerning (6). The Services industry (SIC Division I) is followed by Division E (Transportation, Communications, Electric, Gas, and Sanitary Services, with an average loss of around $58M), which is followed by Division D (Manufacturing, with an average loss of around $25M). The revenue range for companies with the highest number of compromised credentials is $1M-$10M, followed by $10M-$50M. A similar trend is also observed when evaluating company size by the number of employees. Indeed, companies with fewer employees have a higher share of compromised credentials. On average, the larger the company (both in terms of revenue and number of employees (7)), the greater the number of internet-exposed assets.There is a correlation between the industries and revenue ranges of companies targeted by ransomware and those with the highest share of compromised credentials.   ‍Methodology‍The data for this research was collected as follows:‍Data regarding compromised credentials was first collected from Hudson Rock, a provider of various cybercrime data. Data was collected for the previous six months, beginning March 2023. This data Studies ★★★
The_Hackers_News.png 2023-11-27 23:27:00 How to Handle Retail SaaS Security on Cyber Monday (lien direct) If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and engagement will be captured by a CRM platform. Inventory applications will trigger automated re-orders; communication tools will send automated email and text messages confirming sales and sharing shipping information.  SaaS applications supporting retail efforts will host ★★
DarkReading.png 2023-11-27 23:16:00 Cyber Threats to Watch Out for in 2024 (lien direct) As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key. ★★
DarkReading.png 2023-11-27 22:54:00 CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines (lien direct) US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law. ★★
TechWorm.webp 2023-11-27 22:09:04 Police Urging Parents To Disable “NameDrop” Feature On iPhone (lien direct) Multiple police social media pages on Facebook are warning parents to disable a new feature, “NameDrop,” that was rolled out in the iOS 17.1 update earlier this year. This new iPhone feature, which is enabled by default with the iOS 17.1 update, can automatically exchange contact information, including pictures, phone numbers, email addresses, and more, by just holding your iPhone next to another iPhone or Apple Watch close together. Over the weekend, the Middletown Division of Police in Ohio posted a warning on Facebook urging parents to turn off the “NameDrop” feature on their children’s iPhones to prevent the transfer of personal information, such as phone number or email address, and name, to keep them safe. “PARENTS: Don't forget to change these settings on your child's phone to help keep them safe as well,” the Middletown Division of Police wrote in its Facebook post. Even the Oakland County Sheriff's Office in Michigan and the Watertown CT Police Department warned users about the “NameDrop” feature rolled out with the new update. “And yes, we know that it allows you to share it and you can refuse but many people do not check their settings and realize how their phone works,” the Oakland County Sheriff's office wrote in its post. According to Apple's support page on NameDrop, the exchange of information doesn't get completed, if the two iPhone devices are locked or moved away from each other before the NameDrop transfer completes. The Cupertino giant also added on its support page that NameDrop only works for sending new contact information, and not updating an existing contact in the iPhone. To disable the “NameDrop” feature on your iPhone or your kid’s iPhone, you need to go to Settings > General > AirDrop > Bringing Devices Together and turn off the toggle switch.
DarkReading.png 2023-11-27 22:00:00 The Role of the CISO in Digital Transformation (lien direct) A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. ★★
RecordedFuture.png 2023-11-27 22:00:00 AI systems \'subject to new types of vulnerabilities,\' British and US cyber agencies warn (lien direct) British and U.S. cybersecurity authorities published guidance on Monday about how to develop artificial intelligence systems in a way that will minimize the risks they face from mischief-makers through to state-sponsored hackers. “AI systems are subject to new types of vulnerabilities,” the 20-page document warns - specifically referring to machine-learning tools. The new guidelines have ★★★
WiredThreatLevel.png 2023-11-27 21:42:55 4 Cyber Monday Vacuum Deals That Totally Suck (In a Good Way) (lien direct) There are so many reasons not to spend several hundred dollars on a vacuum. But your house is very, very dirty. Now's your chance. ★★
RecordedFuture.png 2023-11-27 21:37:00 Suspected Hamas-linked hackers target Israel with new version of SysJoker malware (lien direct) Hackers possibly linked to the Palestinian militant group Hamas are targeting Israeli critical industry sectors with a new version of the SysJoker backdoor malware, according to cybersecurity researchers. SysJoker was previously used against Israel's educational institutions in 2021. However, since then, the hackers have almost entirely rewritten its code and improved the malware's capabilities. The ★★
DarkReading.png 2023-11-27 21:35:00 Ardent Health Hospitals Disrupted After Ransomware Attack (lien direct) More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities. Medical ★★★
CyberWarzone.jpg 2023-11-27 21:03:08 Man Sentenced to Four Months in Prison for Offering Phishing Panels via Telegram (lien direct) The Netherlands – A man who offered phishing panels via Telegram has been sentenced today by a magistrate to a four-month prison term, two of [more...] Legislation ★★
DarkReading.png 2023-11-27 20:55:00 General Electric, DARPA Hack Claims Raise National Security Concerns (lien direct) Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies. ★★
WiredThreatLevel.png 2023-11-27 20:11:37 18 Best Cyber Monday Pet Deals (2023): Automatic Litter Boxes, Dog Beds (lien direct) Fido needs new treats. Check your furry friends off your gift list with these Cyber Monday deals.
globalsecuritymag.png 2023-11-27 19:56:07 Cactus: der Ransomware-Neuling mit ausgefeilten TTPs (lien direct) Cactus tauchte im März dieses Jahres auf und hat seitdem schon Daten von ein paar weltweit bekannten Unternehmen infizieren können. Logpoint hat Taktiken, Techniken und Prozeduren (TTPs) sowie Indicators of Compromise (IoCs) analysiert, um Abwehrmaßnahmen zu entwickeln. Cactus hat sich zu einer ausgeklügelten Ransomware entwickelt. Der Newcomer tauchte erstmals im März 2023 auf und hat sich in die Top 10 der Malware-Gruppen eingereiht, die die meisten monatlichen Opfer provozierten; im (...) - Malware / , ★★
WiredThreatLevel.png 2023-11-27 19:51:04 62 Best Target Cyber Monday Deals (2023): Smart Home and Toys (lien direct) Need some smart home gadgets or streaming sticks? Target has great deals with a price-match guarantee.
ArsTechnica.png 2023-11-27 19:50:13 DOS_deck offers free, all-timer DOS games in a browser, with controller support (lien direct) Playing Warcraft in a browser, using a controller, somehow feels… okay? ★★
globalsecuritymag.png 2023-11-27 19:48:54 SecurityScorecard – Cybersicherheitsprognosen für 2024 (lien direct) Klein, aber fein: Der Aufstieg spezialisierter Sprachmodelle in der Cybersicherheit. • Große Sprachmodelle (LLMs) lösten einen Wandel in der Cybersicherheit von Organisationen aus. LLMs statten Sicherheitsteams mit der unglaublichen Fähigkeit aus, Berge von Daten durch einfache Abfragen in umsetzbare Erkenntnisse umzuwandeln. Doch obwohl LMMs bahnbrechend waren, führen ihre Einschränkungen beim Verständnis der Feinheiten spezialisierter Cybersicherheitsdatensätze oft dazu, dass Praktiker mit (...) - Sonderberichte /
RecordedFuture.png 2023-11-27 19:23:00 Notorious ransomware gang takes credit for cyberattack on Fidelity National Financial (lien direct) A ransomware group behind some of the biggest cyberattacks in 2023 has taken credit for an incident involving a multibillion-dollar player in the real estate industry. Fidelity National Financial - a Fortune 500 provider of title insurance for property sales - acknowledged an attack in regulatory documents submitted November 21 to the U.S. Securities and ★★
WiredThreatLevel.png 2023-11-27 19:15:49 14 Best Cyber Monday Monitor Deals (2023): Portable, Vertical, Desktop (lien direct) You live in the future, so give up the tiny screen and go big. Some of our favorite monitors are on sale for Cyber Monday.
Blog.png 2023-11-27 19:04:27 General Electric Probes Security Breach as Hackers Sell DARPA-Related Access (lien direct) >By Waqas The data breach was announced by IntelBroker, a threat actor mostly known for data breaches against delivery and logistics companies. This is a post from HackRead.com Read the original post: General Electric Probes Security Breach as Hackers Sell DARPA-Related Access ★★
The_Hackers_News.png 2023-11-27 18:48:00 Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections (lien direct) A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established. The Secure Shell (SSH) protocol is a method for securely transmitting commands and logging in to a computer over an unsecured network. Based on a ★★
WiredThreatLevel.png 2023-11-27 18:45:55 These Cyber Monday Ebike Deals Will Get You Zooming Down the Street (lien direct) This might be your last chance to pick up a sweet new electric bike from Aventon, Rad Power, or Specialized at a tantalizing price.
RecordedFuture.png 2023-11-27 18:45:00 Pennsylvania water authority hit with cyberattack allegedly tied to pro-Iran group (lien direct) A water authority in Pennsylvania reportedly suffered a cyberattack, prompting officials to reassure people in the area that drinking water has not been affected by the incident. The Municipal Water Authority of Aliquippa - which serves thousands of customers in communities northwest of Pittsburgh - did not respond to requests for comment but told local ★★
CS.webp 2023-11-27 18:39:57 US and UK release guidelines for secure AI development (lien direct) >Washington and London want developers and users of machine learning tools to devote more resources toward security. ★★
RecordedFuture.png 2023-11-27 18:34:00 Multiple hospitals divert ambulances after ransomware attack on parent company (lien direct) Hospitals in several states are facing issues due to a ransomware attack on parent company Ardent Health Services, which confirmed on Monday afternoon that it was responding to an incident. Ardent, based in Nashville, runs 37 healthcare facilities across the U.S. Since Thanksgiving, multiple local news outlets have reported that hospitals in their area are Medical ★★★
datasecuritybreach.png 2023-11-27 18:30:59 LE PARLEMENT EUROPÉEN CRITIQUE L\'INACTION SUR LES LOGICIELS ESPIONS (lien direct) Dans une résolution adoptée majoritairement (424 voix pour, 108 contre, et 23 abstentions), les législateurs ont ouvertement critiqué la Commission européenne pour son manque d'action contre les abus liés aux logiciels espions. Cette démarche intervient dans un contexte de plus en plus inquiet concernant la surveillance numérique au sein de l'Union Européenne (UE). ★★
zataz.png 2023-11-27 18:17:55 UNE ANALYSTE DE LA POLICE EMPRISONNÉE POUR AVOIR INFORMÉ UN CRIMINEL DU PIRATAGE D\'ENCROCHAT (lien direct) EncroChat, la souris étant dans le chat ! Une jeune analyste de la police britannique alerte un de ses contacts de l'infiltration de son téléphone portable. Elle sera piégée, à son tour !... ★★
zataz.png 2023-11-27 17:53:54 LA PLUS GRANDE CYBERATTAQUE AU DANEMARK : 22 SOCIÉTÉS ÉNERGÉTIQUES VISÉES (lien direct) Le Danemark a été le théâtre de la plus importante cyberattaque de son histoire avec 22 sociétés énergétiques victimes en seulement quelques jours.... ★★
DarkReading.png 2023-11-27 17:44:00 Hamas-Linked APT Wields New SysJoker Backdoor Against Israel (lien direct) Gaza Cybergang is using a version of the malware rewritten in the Rust programming language. ★★
zataz.png 2023-11-27 17:28:21 MINAGE CLANDESTIN DE CRYPTO À LA COUR : LES JUGES POLONAIS TROUVENT PLUS QUE DES PREUVES ! (lien direct) Vous n'allez pas croire ce qui s'est passé au palais de justice de Varsovie ! Oui, cette noble institution, garante de la justice et de la légalité, est devenue malgré elle une plaque tournante hacker... du minage de crypto-monnaie ! Qui l'eût cru ?... ★★
InfoSecurityMag.png 2023-11-27 17:00:00 Cybersecurity Incident Hits Fidelity National Financial (lien direct) The Alphv/BlackCat ransomware group has claimed responsibility for the attack ★★
zataz.png 2023-11-27 16:44:12 VISHING : LA POLICE DÉMANTELE UN GANG DE FRAUDEURS BANCAIRES (lien direct) Les services de police ukrainienne et tchèque mettent la main sur des pirates informatique spécialisés dans les appels téléphoniques piégés. Ces hackers malveillants auraient gagné 8 millions d'euros avec leurs vishing.... ★★
mcafee.png 2023-11-27 16:31:36 Beneath the Surface: How Hackers Turn NetSupport Against Users (lien direct) > NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
InfoSecurityMag.png 2023-11-27 16:30:00 SysJoker Malware: Hamas-Related Threat Expands With Rust Variant (lien direct) CPR said the malware now uses OneDrive instead of Google Drive for storing dynamic C2 server URLs ★★
zataz.png 2023-11-27 16:29:28 LE CONFLIT MILITAIRE EN BIRMANIE PERTURBE DES PIRATES INFORMATIQUES (lien direct) La guerre entre la junte Birmane et des groupes d'opposants perturbent des milliers de hackers malveillants présents dans le pays.... ★★
zataz.png 2023-11-27 16:17:46 CONDAMNATION À 80 MOIS DE PRISON POUR AVIRAM AZARI, IMPLIQUÉ DANS UNE VASTE CAMPAGNE DE PIRATAGE INFORMATIQUE (lien direct) Damian Williams, le Procureur des États-Unis pour le District Sud de New York, a annoncé la condamnation d'Aviram Azari à 80 mois de prison. Un pirate israélien qui travaillait avec des hackers Indiens.... Legislation ★★
News.png 2023-11-27 16:15:06 UK and US lead international efforts to raise AI security standards (lien direct) 17 countries agree to adopt vision for artificial intelligence security as fears mount over pace of development The UK's National Cyber Security Agency (NCSC) and US's Cybersecurity and Infrastructure Security Agency (CISA) have published official guidance for securing AI applications – a document the agencies hope will ensure that safety is inherent in AI's development.… ★★
RecordedFuture.png 2023-11-27 16:15:00 Second top Ukrainian cyber official arrested amid corruption probe (lien direct) A high-profile Ukrainian cybersecurity official who was fired from his position last week was detained on Monday for his alleged involvement in an embezzlement scheme. Viktor Zhora, the ex-deputy head of Ukraine's State Service for Special Communications and Information Protection (SSSCIP) will be held in pretrial detention for two months with bail set at $276,000,
RecordedFuture.png 2023-11-27 16:15:00 Tao Thomsen and the effort to back up what makes Ukraine uniquely Ukrainian (lien direct) Since the beginning of Russia's invasion of Ukraine, government officials, independent media organizations, and nonprofits have accused Russia of deliberately targeting churches and libraries and looting its most important museums. The intentional destruction of cultural heritage is a war crime, and Ukrainians say this is nothing less than an attempt to erase what makes Ukraine ★★
globalsecuritymag.png 2023-11-27 16:14:42 Privacera AI Governance Integrates with AWS on Foundational Model Security (lien direct) Privacera AI Governance Integrates with AWS on Foundational Model Security Seamlessly integrate with AI applications built on Amazon Bedrock and Amazon SageMaker to innovate with secure generative AI applications - Product Reviews ★★
Cybereason.png 2023-11-27 16:07:26 2024 Cybersecurity Predictions - Generative AI Reshapes Cybersecurity (lien direct) 2024 Cybersecurity Predictions I can't believe another year has flown by, but wow what a year it's been! I suspect many of us saw smartphones and the cloud as the biggest transformations of our generation, but the reality is that these have been gazumped by the introduction of generative AI. Prediction ★★
globalsecuritymag.png 2023-11-27 16:03:43 Veracode launched Dynamic Duo: DAST Essentials and Veracode GitHub App (lien direct) Veracode Revolutionises Cloud-Native Security with Dynamic Duo: DAST Essentials and Veracode GitHub App Intelligent Software Security Leader Unveils Unified Defence Against Threats from Code to Cloud at AWS re:Invent 2023 - Product Reviews ★★
WiredThreatLevel.png 2023-11-27 16:01:36 These Cyber Monday Sonos Deals Will Make Your House Sing (lien direct) There's no better time to upgrade your at-home setup with these sales on our favorite Sonos speakers and soundbars.
Veracode.png 2023-11-27 16:01:16 Top 5 Open Source Security Risks IT Leaders Must Know (lien direct) Lurking in the open source software (OSS) that pervades applications around the world are open source security risks technology leaders must be aware of. Software is one of technology's most vulnerable subsets with over 70% of applications containing security flaws. Here are the open source security risks IT leaders must be aware of to protect technology and help it scale safely.  Why Address Open Source Software Security Risks  On December 9, 2021, a Tweet exposed a vulnerability in the widely-used OSS library Log4j. It didn't take long before attackers around the world were working to exploit the Log4j vulnerability. This incident was a wake-up call to how the security of a library can quickly change and proactive measures must be in place to protect from this danger.   Log4j is just one example of how vulnerabilities in open source pose significant risks that can impact operations, data security, and overall IT health. Strategic technology choices can make a big impact on how much… ★★
bleepingcomputer.png 2023-11-27 16:00:57 Microsoft deprecates Defender Application Guard for Office (lien direct) Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules, Protected View, and Windows Defender Application Control as an alternative. [...] ★★
globalsecuritymag.png 2023-11-27 16:00:41 Texas Rangers\' World Series triumph backed by Lumen DDoS protection Lumen DDoS Hyper thwarts cyber threats during one of the world\'s biggest sporting events (lien direct) Texas Rangers' World Series triumph backed by Lumen DDoS protection Lumen DDoS Hyper thwarts cyber threats during one of the world's biggest sporting events - Market News ★★
Fortinet.png 2023-11-27 16:00:00 Q&A with Ken Xie on Sharpening Fortinet\'s Business Focus and Culture of Innovation (lien direct) Tied to Fortinet's Q3 2023 earnings, we spoke with Ken Xie to dive a little deeper into the announcement of strategic investments centered around three markets: Secure Networking, Universal SASE, and Security Operations. Read more. ★★
globalsecuritymag.png 2023-11-27 15:58:54 Cyberattaque contre CTS - Analyse de Netwrix (lien direct) Une cyberattaque contre CTS, l'un des principaux fournisseurs de services managés (MSP) pour les cabinets d'avocats et d'autres organisations du secteur juridique britannique, est à l'origine d'une panne majeure qui affecte depuis plusieurs jours de nombreuses organisations. Dirk Schrader, Field CISO EMEA and VP of Security Research chez Netwrix, analyse cet incident ciblant un fournisseur de services managés : - Malwares ★★
globalsecuritymag.png 2023-11-27 15:56:07 Zimperium Recognized as a Proud Participant in the Microsoft Security Copilot Partner Private Preview (lien direct) Zimperium was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting-edge functionality, and close relationship with Microsoft. - Business News ★★
globalsecuritymag.png 2023-11-27 15:39:35 Le paradigme de la forteresse en cybersécurité : Élever les murs ou détecter les intrus ? (lien direct) Le paradigme de la forteresse en cybersécurité : Élever les murs ou détecter les intrus ? Par Dwayne McDaniel, Security Advocate chez GitGuardian - Points de Vue ★★
Last update at: 2023-11-29 22:10:09
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter