Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cyberpills.news

IT security of SMEs: risks and solutionsHow to protect SME IT security from human error and the use of personal devicesThe IT security of companies, especially small and medium-sized enterprises, is increasingly exposed to cyber risks and attacks, as recently reported by Kaspersky. Many of these attacks come from inside the company and are caused by employee misconduct. According to Pierluigi Paganini, cyber security...

June 2023 Android security updates: fix critical vulnerability CVE-2022-22706Fixed a serious vulnerability that put the security of mobile devices at riskGoogle has released the Android Security Bulletin for June 2023, which contains fixes for 56 vulnerabilities found in its operating system, across all its versions 11 to 13. Among the 56 vulnerabilities, 5 were classified as critical. Exploiting vulnerabilities can lead to attacks of various nature,...

Stealth Soldier espionage malware strikes in North AfricaConstantly evolving highly targeted and personalized attacksA new custom backdoor, called the Stealth Soldier, has been used as part of a set of highly targeted espionage attacks in North Africa. Check Point, a cybersecurity firm, stated in a technical report that the Stealth Soldier malware is an undocumented backdoor that mainly operates on surveillance functions,...

Fighting cybercrime: the role of the second additional protocol to the Budapest ConventionAn in-depth look at article 6: a powerful tool for international cooperation in cybercrime investigationsCybercrime represents one of the most pervasive and constant threats in the global security landscape. Given the large transnational nature of these crimes, international cooperation is essential. The Second Additional Protocol to the Budapest Convention aims to strengthen international collaboration...

Patched critical security vulnerability in Windows: details emergeThe exploit, now fixed, gave attackers potential access to system privileges. Cybersecurity firm Numen Cyber reveals how the important loophole could have been exploitedDetails are emerging about a now-fixed security vulnerability that was being actively exploited in Microsoft Windows. This could be used by a threat actor to gain elevated privileges on affected systems. This vulnerability, identified as CVE-2023-29336, has been rated with a severity rating of 7.8 and...

Overcoming silos in cybersecurity: the role of mWISEPromote cooperation and common understanding among industry professionals for more effective cybersecurityThe cybersecurity industry is currently grappling with a significant problem: fragmentation. According to ISSA, the International Information Systems Security Certification Consortium, 77% of industry professionals express the need for greater industrial cooperation. This desire arises mainly from the...

Countering the CL0P ransomware group: recommendations from CISA and the FBIHow to defend against cyber attacks: prevention, detection and protection of digital assets in the crosshairs of cybercriminalsThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) recently issued a series of recommendations with the aim of protecting organizations from possible attacks perpetrated by the CL0P Ransomware Group. On Wednesday, CISA announced new cybersecurity...

Protecting hospitals from cyber attacks: the objectives of the new NHS Cyber Security StrategyFocus on the strategy that aims to protect the british healthcare system from cyber risks, prevent attacks and guarantee the security of sensitive dataThe growing attention of cybercriminals towards the NHS poses a direct threat to people's lives. The numerous organizations in the healthcare system must guarantee the maximum possible protection of the privacy of their patients, an objective to which the new NHS Cyber Strategy promoted by the British...

Critical vulnerabilities in Honda's e-commerce platform for selling equipmentThe importance of customer data protection on e-commerce platformsHonda, a well-known automaker, has seen a number of serious vulnerabilities come to light on its e-commerce platform dedicated to the sale of equipment, such as generators, pumps, lawn mowers and boat engines. The discovery was made by an American researcher, Eaton Zveare, who at the beginning of the...

Ransomware tracking in Italy: recent cases and preventionHow cybersecurity can protect Italian companies from ransomware attacks: advice and practical solutions to prevent and manage attacksRansomware, a type of malware that spreads rapidly on a global scale, poses a growing threat to businesses and individuals in Italy. The impact of these attacks can be monitored through a continuously updated dashboard, thanks to which it is possible to examine the claims of cybercriminals related to...

Inauguration of the Global Cybersecurity Forum Institute: cybersecurity for a global futureA new international platform to address the challenges and opportunities of cyberspace, enhancing collaboration and innovation among global stakeholdersThe recent establishment of the Global Cybersecurity Forum Institute represents a significant step forward in addressing systemic challenges and exploiting the many opportunities presented by cyberspace. This new body, aimed at promoting collaboration among the world's key cybersecurity stakeholders,...

Barracuda networks calls for the replacement of compromised ESG equipmentFollowing a security breach, the company detects a zero-day attack and prompts immediate customer response to prevent further damageBarracuda Networks has urged its customers to promptly replace their compromised Email Security Gateway (ESG) equipment, regardless of installing all available patches. The company identified targeted attacks on its ESG assets on May 18. Within a day, he discovered that the attacks exploited a zero-day...

Security challenges in AI: detailed analysis by the EU Agency for CybersecurityReports from ENISA highlight fundamental challenges of AI in terms of privacy and security, gaps in research and best practices to secure AI systemsThe EU Cybersecurity Agency, ENISA, recently released a series of reports highlighting the challenges Artificial Intelligence (AI) faces in cybersecurity. These reports were released simultaneously with the AI Cybersecurity Conference, organized by ENISA, during which the cybersecurity implications for...

The challenge of cybersecurity: defending against AI threats and exploiting their opportunitiesIn-depth analysis of new threats and innovative strategies of effective proactive defense based on artificial intelligenceTechnologies based on artificial intelligence (AI) are rapidly transforming the world, but at the same time, they represent a source of cybersecurity risk. New cyber threats are increasingly sophisticated thanks to the ease of access to tools and methodologies that were unthinkable until recently. Furthermore,...

VMware addresses critical vulnerabilities in Aria Operations for NetworksThe tech giant quickly responds to three serious vulnerabilities, protecting businesses from possible remote code execution attacksVMware, the virtualization technology giant, released urgent fixes on Wednesday to address security flaws in its Aria Operations for Networks product. These vulnerabilities put enterprises at risk by exposing them to possible remote code execution attacks.Three critical vulnerabilities in network and...

$1.2 million settlement over cybersecurity breaches at cryptocurrency platformThe New York Department of Financial Services fines a major crypto trading platform for lapses in its cybersecurity programOn May 1, the New York Department of Financial Services (NYDFS or "Department") reached an agreement with a trading platform to address deficiencies found during inspections conducted in 2018 and 2020. The agreement focused on several issues related to the company's cybersecurity program and resulted...

Strengthening SaaS security: challenges and effective strategiesThe increase in security incidents related to SaaS applications requires a revolution in threat prevention and detection strategiesCurrent security strategies for Software-as-a-Service (SaaS) applications are unsatisfactory, according to a report from Adaptive Shield. This is evidenced by the many recent security incidents related to SaaS applications. “We wanted to gain a deeper understanding of incidents in SaaS applications a...

Optimize cybersecurity with behavior analyticsImplementation of UEBA and other analytical tools to improve threat detection and incident responseBehavior analysis is a powerful tool in the field of information security. Methodologies such as User and Entity Behavior Analysis (UEBA), Network Traffic Analysis (NTA), Anomaly Detection, Threat Hunting, and Risk Assessment and Prioritization play a crucial role in identifying and counter security...

Public vs private sector: differences in application securityHow government organizations can overcome security challenges in software applications to ensure effective data protectionApplications developed by public sector organizations tend to have more security flaws than those created by the private sector, as noted by Veracode. These findings are of particular significance as an increase in flaws and vulnerabilities in applications translates into increased levels of risk. The...

Illegitimate extensions and the satacom downloader: a new crypto-stealing malware menaceHow the recent malware campaign abuses Chromium-based browsers and targets leading cryptocurrency platformsA new malicious software operation has been recently identified, utilizing the Satacom downloader as a vehicle to disseminate covert malware, aimed at covertly extracting cryptocurrencies through an illicit extension for Chromium-based web browsers. The primary objective of the virus, delivered through...

Verizon 2023: an explosion of ransomware attacks and cyber threatsVerizon data breaches report highlights rising wave of ransomware attacks, rising related costs, and importance of the human rlement in security breachesOn Tuesday, Verizon released its 16th Annual Data Breaches Report (DBIR). This report provides organizations with valuable insights from incidents analyzed by its Threat Research and Advisory Center. The DBIR is among the most anticipated reports in the cybersecurity industry, given the analysis of a...

Apple strengthens privacy and security with several innovationsNew tools and updates in Safari private browsing, Communication safety and Lockdown mode for safer and more controlled browsingApple announced its latest privacy and security innovations, including major updates to Safari Private Browsing, Communication Safety and Lockdown Mode, as well as app privacy improvements. Additionally, the company introduced new features designed with privacy and security at its core, including Check...

PostalFurious: new phishing SMS campaign targets users in UAEScam masquerading as postal services and toll operators aims to steal personal data and payment credentials through fake text messagesA Chinese phishing group named PostalFurious has been associated with a new SMS campaign targeting users in the UAE. This campaign is posing as postal services and toll operators, according to Group-IB, a Singapore-based cybersecurity company. The fraudulent tactic used includes sending bogus text messages...

OpenAI and Microsoft unveil groundbreaking AI cybersecurity grant initiativeFostering innovation in cybersecurity: A bold new approach to empower defenders and elevate discourseOpenAI, with the backing of Microsoft, recently launched an inventive cybersecurity grant initiative. This groundbreaking move is part of their broader effort to strengthen artificial intelligence (AI)-based cybersecurity measures. This commitment to cybersecurity enhancement is showcased by the proactive...

Cyclops ransomware: new threats emerge with data theft capabilitiesA sophisticated cybercrime strategy carries out cross-platform attacks, affecting Windows, macOS and Linux with theft of sensitive dataThreats related to Cyclops ransomware have been observed offering malware designed to capture sensitive data from infected hosts. The notorious ransomware is notable for its ability to target all major desktop operating systems, including Windows, macOS, and Linux. It is also designed to terminate any...

Fighting cybercrime: the 2022 FBI reportDiscover the main types of cyber attacks, their financial impact and web security defense strategiesAccording to the latest cybercrime report released by the FBI, cyber risk is a business risk and cyber security is a national security concern. This notion is backed up by worrying data: In 2022, the FBI's Internet Crime Reporting Center (IC3) received more than 800,000 cybercrime reports, resulting...

Discovered over 30 malicious extensions in the Chrome Web StoreThe extensions, used by millions of users, contained malicious code aimed at displaying unsolicited ads and manipulating search resultsRecently, security experts identified more than 30 malicious extensions that had infiltrated the Chrome Web Store, possibly infecting millions of users. The discovery was initially made by security researcher Wladimir Palant, who three weeks ago realized that the PDF Toolbox extension for Chrome contained...

New web skimmer attack: Akamai reveals threat to e-commerce sitesAkamai investigation exposes growing harmfulness of e-skimming techniques, putting personal data and credit card information at riskAkamai, a leading cybersecurity company, has recently detected a sophisticated Magecart-style web skimming campaign targeting the theft of Personally Identifiable Information (PII) and credit card data from e-commerce portals. During the operation, attackers use a combination of evasive strategies including...

From IT outsourcing to hack-for-hire: the new face of India's digital marketHow cybermercenaries are revolutionizing India's tech industry, amidst security threats and market opportunitiesThe global IT outsourcing market has undergone a drastic evolution. Initially, it was dominated by the migration of IT services of American and European multinational companies to Indian companies, thanks to the combination of technical expertise and lower costs. However, with the advent of artificial...

Trellix boosts cybersecurity in Africa with scalable XDR platformUnveiling AI and machine learning-based security solutions to strengthen the digital landscape in Africa, Trellix fortifies local partnerships and empowers businesses with its "living security" app...Trellix, a leading global cybersecurity firm, is looking to extend its presence in Africa by implementing its versatile Extended Detection and Response (XDR) cybersecurity platform. The corporation intends to cater to business-specific needs by offering state-of-the-art enterprise-level cybersecurity...

The race for artificial intelligence: Josh Lospinoso's alarmThe cybersecurity expert highlights the threats of AI and the need for security in military and commercial operationsBefore founding his current startup, Shift5, which works with the US military, railway operators and airlines such as JetBlue, Josh Lospinoso had already created a cybersecurity startup that was purchased in 2017 by Raytheon/Forcepoint. A former Army captain and 2009 West Point graduate, Lospinoso spent...

SQL injection vulnerability affects MOVEit Transfer: A security appealProgress software confirms a serious risk for organizations. Researchers and security professionals investigate the impact of the incidentThe Progress Software company recently updated a security advisory confirming the existence of a SQL Injection vulnerability in the MOVEit Transfer web application. Although a CVE number has not yet been assigned, this vulnerability could allow an unauthenticated attacker to gain unauthorized access...

More severe than expected data breach in San Diego school districtDisclosing Investigation of Last Fal's security incident highlights wider compromise of sensitive student and employee dataThe San Diego unified school district recently admitted that last fall's data breach had more severe and widespread repercussions than previously reported. Dennis Monahan, executive director of the district's risk management services, said the October security incident compromised a wider range of sensitive...

In the sea of cybersecurity: focus on Walmart and the Zero-Trust approachFind out how companies can protect themselves from cyber threats in an increasingly digitized world, taking inspiration from Walmart and the implementation of the Zero-Trust modelThe growing occurrence of cybersecurity breaches involving organizations of all sizes is a serious problem that cannot be ignored. From giants like Apple, T-Mobile and Uber, no company appears to be immune, with breaches costing American businesses millions of dollars. This vulnerability has been amplified...

The growing threat of cyberattacks in the automotive sectorModern vehicle technologies accentuate vulnerability to cyber risks, creating urgent safety challenges in the future of motoringIn the digital age, vehicles, especially those with sophisticated electronic systems, are becoming increasingly exposed to the risks of cyber attacks. The threat is not just limited to electric cars, but also extends to modern sedans and utility vehicles, which are capable of being hacked. This danger...

5G networks: discover the risks and how to mitigate themFrom slow 5G deployment to cybersecurity challenges, we explore the 5G landscape and offer strategies to protect your devicesThe introduction of 5G networks has proved to be a slower process than expected. Although the concept was unveiled in 2016, its global availability was only achieved in 2019. Four years later, the share of the population with 5G-enabled devices remains low in most countries. It is unclear whether the...

Angelina Xu: brilliant MIT student wins eighth ESET fellowship for women in cybersecurityFrom Ridge High School to MIT, Angelina Xu demonstrates the power of diversity in STEM and stands out for her contributions to the cybersecurity field, encouraging other women to pursue careers in this...Basking Ridge High School alumna Angelina Xu was recently awarded another prestigious award – the 8th Annual Women in Cybersecurity Scholarship offered by ESET North America. Angelina, a 2021 graduate of Ridge High School, is one of four women selected to receive this scholarship.A brilliant academic j...

Galvanick leads innovation in industrial safety with $10 million in fundingCybersecurity startup plans to revolutionize critical infrastructure defense with backing from well-known investorsGalvanick, an early start-up working on an Extended Detection & Response (XDR) platform for industrial infrastructure, has secured $10 million in venture capital funding. This Los Angeles-based company was co-founded by cybersecurity veterans from the US government and Amazon. Several investment firms...

Toyota: prolonged data exposure due to cloud configuration glitchAutomobile giant conducts thorough security checks after years-long customer data breach impacts both domestic and international clientsRenowned Japanese automobile manufacturer Toyota revealed this week that a glitch in its cloud configuration has resulted in a multi-year exposure of its customer data. The security flaw affected environments managed by Toyota Connected Corporation (TC), encompassing a wide range of information including...

Critical flaw discovered in the ReportLab Toolkit: remote code execution riskAn exploit for a ReportLab vulnerability, used to generate PDFs from HTML, puts millions of users at risk. A security update is availableA researcher has revealed a hands-on experiment of a flaw that allows remote code execution, known as RCE, that affects the ReportLab Toolkit. This tool, a Python library widely used by many projects to convert HTML files to PDF, has a monthly download volume of about 3.5 million on the PyPI (Python...

Critical flaws revealed in Sonos One speakersCybersecurity specialists have exposed flaws that allow remote code execution and the disclosure of sensitive dataThe Zero Day Initiative (ZDI) revealed a number of security issues surrounding Sonos One wireless speakers in its latest report last week. These flaws could be exploited to achieve disclosure of sensitive information and remote code execution.Details of the vulnerabilities discovered in the Pwn2Own hacking...

Fortify your web applications: comprehensive guide to penetration testing and PTaaS for continuou...Discover the seven stages of effective pen testing and the benefits of Pen Testing as a Service (PTaaS) for proactive and continuous web application securityWith the increasing sophistication of cyber-attacks, organizations are recognizing the critical need to protect their web applications from security vulnerabilities. Penetration testing, or pen testing, has emerged as a common practice for identifying and addressing such vulnerabilities. This article...

Expanding cyber threat: GobRAT targets Linux routers in JapanAttack detected by JPCERT Coordination Center compromises router security, obfuscating malware as Apache process and establishing dangerous remote accessThe cybersecurity world has recently been rocked by a new remote access trojan, written in Golang and known as GobRAT. This insidious software targets Linux routers in Japan, and its initial attack strategy involves locating a router whose WEBUI is freely accessible to the public. The trojan then exploits...

Security issue in the WordPress Gravity Forms pluginMore than 930,000 websites could be exposed to security risks due to unauthenticated injection of PHP objects in the popular pluginThe popular WordPress plugin "Gravity Forms", currently used by over 930,000 websites, is vulnerable to unauthenticated PHP object injection. "Gravity Forms" is a customizable form-building tool used by website owners to make payments, registrations, file uploads, or any other forms needed for visitor-site...

The revolutionary impact of machine learning in cybersecurityAn overview of the crucial role of machine learning in strengthening defenses against emerging cyber threats and attacksMachine learning has emerged as one of the most dynamic fields in data science, acting as a subset of artificial intelligence that allows systems to learn from data and make accurate predictions, detect anomalies or make recommendations through various techniques. These methods extract insights from...

Microsoft discovers vulnerabilities in macOS operating systemsMigraine vulnerability allows attackers to bypass System integrity protection security feature, with serious implications on data protection and system stabilityTech giant Microsoft and its security team have discovered and reported to Apple a significant vulnerability in macOS operating systems, dubbed "Migraine". This security flaw, which has the identification number CVE-2023-32369, has raised serious concerns in terms of data protection and system stability....

Critical vulnerability in Gigabyte motherboard firmware: millions of PCs at riskEclypsium detects a hidden and insecure backdoor in the Taiwanese manufacturer's motherboards, opening the door to potential cyberattacksMillions of PC motherboards have been sold with a backdoor in the firmware, recent studies have revealed. This poses a significant security risk, as it makes the work of cybercriminals easier. In fact, the ability to hide malicious programs in the computer's UEFI firmware, which governs the loading of...

JumpCloud winner of the 2023 Fortress cybersecurity awardIndustry recognition for innovative open directory platform, bulwark against cyber threatsThe Corporate Intelligence Group announced on May 31, 2023, in Louisville, Colorado, that JumpCloud Inc. has been awarded the prestigious accolade of the 2023 Fortress Award for Cybersecurity, in the Authentication and Identity category. This industry award recognizes and honors the world's leading companies...

Zyxel fixes major vulnerability in home NAS devicesUsers are advised to update their systems immediately to avoid potential cyber-attacksZyxel, a company renowned for the production of network connected storage devices (NAS) for home use, has solved a significant security problem. The vulnerability, named CVE-2023-27988, was a high-severity security risk involving authenticated command injection. This security issue was seen in the device...

SpinOk spyware found in over 100 android apps with 421 million downloadsMalicious software, identified by Doctor Web, steals data and interacts with users through bogus games and prizes, endangering privacyThe antivirus company, Doctor Web, has detected spy software in more than 100 Android applications. These applications have amassed over 421 million downloads on Google Play. The malicious entity, dubbed 'SpinOk' by Doctor Web, comes in the form of a marketing SDK.SpinOk hidden features and user interaction...

Don’t miss the most important news
Enable notifications to stay always updated