Aggregator
CVE-2024-30477 | Klarna Payments for WooCommerce Plugin up to 3.2.4 on WordPress authorization
CVE-2024-31099 | Averta Shortcodes and Extra Features for Phlox Theme up to 2.15.5 on WordPress authorization
CVE-2024-30482 | Brice Capobianco Simple Revisions Delete Plugin up to 1.5.3 on WordPress cross-site request forgery
U.S. Govt. Funding for MITRE's CVE Ends April 16, Cybersecurity Community on Alert
Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, and decision-makers a tool to see the bigger picture. Threat intelligence Cyber threat intel (CTI) teams can use Attack Flow to show how attackers behave, not just what tools they use. It tracks activity across incidents, campaigns, or threat groups. Because it’s machine-readable, … More →
The post Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques appeared first on Help Net Security.
What Getting in Trump's Crosshairs Will Mean for SentinelOne
Trump’s executive order revoking security clearances from SentinelOne over its hiring of former CISA head Chris Krebs is fueling fear in the cybersecurity sector. Experts warn the decision could hinder cybersecurity talent recruitment and public-private partnerships essential to national defense.
European Companies Infected With New Chinese-Nexus Backdoor
Likely Chinese nation-state hackers are targeting European companies using previously unseen malware backdoor variants with advanced network tunneling and evasion capabilities for data theft. Brussels-based security firm Nviso links the campaign to a threat actor tracked as UNC5221.
Texas Pediatric Orthopedics Clinic Says Hack Affects 140,000
Ransomware group Qilin posted at least 42 gigabytes of data stolen from a Texas pediatric orthopedic practice for sale on its darkweb leak site in February. In recent days, Central Texas Pediatric Orthopedics began notifying more than 140,000 people that their data was compromised by hackers.
Chinese Hackers Deploy Stealthy Fileless VShell RAT
A Chinese state-backed hacking group tracked as UNC5174 relaunched its operations after a year of silence with a campaign using a memory-only remote access Trojan that evades traditional detection mechanisms, according to new research from cybersecurity firm Sysdig.
Whistleblower Accuses DOGE of Data-Harvesting Cover Up
A whistleblower has accused staffers from the Department of Government Efficiency of attempting to cover their tracks while collecting troves of sensitive data from the independent labor agency's computer systems, raising significant security concerns.
ZDI-CAN-26978: Apple
ZDI-CAN-26966: Apple
ZDI-CAN-26520: Samsung
ZDI-CAN-26463: Schneider Electric
ZDI-CAN-26363: Microsoft
CVSS 10.0: баг в Apache Roller открывает дверь хакерам даже после смены пароля
The future of authentication: Why passwordless is the way forward
By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. That’s why passwordless authentication is gaining serious ground. Adopting passwordless authentication comes with challenges, including resistance to change, integration with legacy systems, and initial costs. Organizations may also have concerns about security, user experience, accessibility, compliance, and data privacy. … More →
The post The future of authentication: Why passwordless is the way forward appeared first on Help Net Security.