Aggregator
Госхакеры, zero-day, утечки… Обычный день в облаках Microsoft
AI and automation shift the cybersecurity balance toward attackers
Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet.
The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.
The Myth of the Perfect CISO: A Multitalented Master of All
There were never many 'do everything' CISOs. Today there are even fewer. But with a specialist area, strong overview and ability to channel expertise, CISOs can align with business goals, embrace the business enabler role, demonstrate quick wins, and ensure their organization makes better risk decisions.
Ascension Notifying Patients About Rash of Third-Party Hacks
Catholic hospital chain Ascension Health is notifying hundreds of thousands of individuals across several states of at least four hacking incidents in recent months involving third-parties. Ascension reported one of the breaches this week, another in mid-April and the others in March and February.
Planned CISA Cuts Face Political Delays and Growing Backlash
Top officials at the nation's cyber defense agency want to give President Donald Trump's pick to lead the agency time to assess major restructuring plans - a move that is reportedly delaying the timeline for reductions in force while causing growing concerns for job stability among staffers.
Scattered Spider Linked to Marks & Spencer Hack
British retailer Marks & Spencer was reportedly targeted by financial crime group Scattered Spider, who deployed ransomware on the company's VMware ESXi server. The retailer continues to recover from a cyber incident that disrupted operations in its online and offline stores.
Когда “военкомат” в теме письма значит только одно — в системе уже RAT
Lynx
Иногда лучший ответ на атаку — это вежливый 200 OK… и бомба внутри архива
CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a newly discovered and actively exploited vulnerability in the widely used Apache HTTP Server. The flaw, catalogued as CVE-2024-38475, affects the server’s mod_rewrite module and poses significant risks to organizations worldwide. Details of the Vulnerability CVE-2024-38475 is classified as an “improper escaping […]
The post CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Загадка, перед которой отступили Ньютон и Галуа — и которую внезапно решил профессор из Сиднея
Phone theft is turning into a serious cybersecurity risk
Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the Metropolitan Police seizes 1,000 phones each week. Stolen phones don’t just go to local black markets. They often get funneled into larger criminal operations. For example, stolen phones can be used to bypass security features or be reprogrammed and resold. In 2024, Europol uncovered a massive phishing network that affected … More →
The post Phone theft is turning into a serious cybersecurity risk appeared first on Help Net Security.
sessionless: Burp Suite extension for editing, signing, verifying various signed web tokens
Sessionless Sessionless is a Burp Suite extension for editing, signing, verifying, and attacking signed tokens: Django TimestampSigner, ItsDangerous Signer, Express cookie-session middleware, OAuth2 Proxy, and Tornado’s signed cookies. It provides automatic detection and in-line editing of tokens within HTTP...
The post sessionless: Burp Suite extension for editing, signing, verifying various signed web tokens appeared first on Penetration Testing Tools.
从应急响应视角理解威胁狩猎
Ты верил этим постам, а их написал ИИ: политические боты захватили соцсети
SentryPeer: distributed list of bad IP addresses and phone numbers
SentryPeer A distributed list of bad IP addresses and phone numbers was collected via a SIP Honeypot. This is basically a fraud detection tool. It lets bad actors try to make phone calls and...
The post SentryPeer: distributed list of bad IP addresses and phone numbers appeared first on Penetration Testing Tools.