Author: Admin

December 19, 2024Ravi LakshmananPrivacy / Data Protection The Dutch data protection authority (DPA) on Wednesday fined video-on-demand streaming service Netflix 4.75 million euros ($4.93 million) for not giving consumers enough information about how it used their data during from 2018 to 2020. An investigation launched by the DPA in 2019 found that the tech giant did not make clear enough to customers in its privacy statement about what it does with the data it collects from its users. This includes email addresses, phone numbers, payment information, and information about what customers are viewing on the platform. “Furthermore, customers were not…

Read More

December 19, 2024Ravi LakshmananVulnerability / Network Security Fortinet has issued a recommendation for a a critical security flaw is now fixed which affect the Wireless LAN Manager (FortiWLM) which could lead to disclosure of sensitive information. The vulnerability, tracked as CVE-2023-34990, has a CVSS score of 9.6 out of a maximum of 10.0. “Passing a relative path (CWE-23) in FortiWLM could allow a remote, unauthenticated attacker to read sensitive files,” the company said in a statement. said in a warning issued Wednesday. However, according to A description security flaw in NIST’s National Vulnerability Database (NVD), the path traversal vulnerability could…

Read More

December 19, 2024Ravi LakshmananCloud Security / Encryption The US Cybersecurity and Infrastructure Security Agency (CISA) issued Mandatory Operational Directive (BOD) 25-01, directing federal civilian agencies to secure their cloud environments and adhere to basic configurations of Secure Cloud Business Applications (SCuBA). “Recent cyber security incidents highlight the significant risks associated with misconfigurations and weak security controls that attackers can use to gain unauthorized access, steal data, or disrupt services,” the agency notes. saidadding that the directive “will further reduce the attack surface of federal government networks.” As part of the 25-01 agency also is recommended to deploy CISA-developed automated configuration…

Read More

December 18, 2024Ravi LakshmananSaaS Security / Incident Response BeyondTrust has disclosed details of a critical security flaw in its Privileged Remote Access (PRA) and Remote Support (RS) products that could potentially lead to the execution of arbitrary commands. Privileged Remote Access monitors, manages, and validates privileged accounts and credentials, offering internal, external, and third-party users zero-trust access to on-premises and cloud resources. Remote support allows support staff to securely connect to remote systems and mobile devices. Vulnerability, tracked as CVE-2024-12356 (CVSS score: 9.8), was described as an instance of team introduction. “A critical vulnerability has been discovered in the Privileged…

Read More

December 18, 2024Hacker newsThreat Detection / Endpoint Security For small and medium-sized enterprises (SMEs) and managed service providers, a top priority for cybersecurity managers is keeping the IT environment up and running. To protect against cyber threats and prevent data breaches, it is vital to understand the current cybersecurity vendor landscape and continually evaluate the effectiveness of available solutions. Fortunately, the 2024 MITER ATT&CK Evaluation—the most trusted resource for tracking effective solutions—is now available. this practical guidance distills the main findings and advice on interpreting the results. Cynet was the only vendor to achieve 100% visibility and 100% protection in…

Read More

December 18, 2024Ravi LakshmananEmail Security / Cloud Security Cybersecurity researchers have uncovered a new phishing campaign targeting European companies to obtain account credentials and take control of victims’ Microsoft Azure cloud infrastructure. Division 42 of Palo Alto Networks codenamed the company HubPhish for abusing HubSpot’s tools in the attack chain. The targets include at least 20,000 users in the automotive, chemical and industrial industries in Europe. “Company phishing attempts peaked in June 2024 with fake forms created using HubSpot’s Free Form Builder service,” security researchers Shachar Roitman, Ohad Benjamin Maimon, and William Gamazo said in a report shared with The…

Read More

December 18, 2024Ravi LakshmananCyber ​​espionage / malware Russia-linked threat actor APT29 has been seen repurposing legitimate red teaming attack methodology as part of cyberattacks using malicious Remote Desktop Protocol (RDP) configuration files. Activities targeting governments and armed forces, think tanks, academic researchers, and Ukrainian organizations entail adopting the “rogue RDP” method that was previously documented Black Hills Information Security in 2022, Trend Micro report says. “A victim of this technique would give partial control of their machine to an attacker, potentially leading to data leakage and the installation of malware,” researchers Feike Hackebord and Steven Hilt said. The cyber security…

Read More

In my nearly eight years at ActiveState, I’ve seen many iterations of our product. However, one thing has remained true over the years: our commitment to the open source community and companies that use open source in their code. ActiveState has been helping enterprises manage open source for more than a decade. In the early days, open source was in its infancy. We focused mainly on the developer case, helping to get open source on platforms like Windows. Over time, our focus has shifted from helping open source companies to supporting businesses running open source when the community wasn’t building…

Read More

December 18, 2024Ravi LakshmananCyber ​​Fraud / Social Engineering INTERPOL is calling for a linguistic shift that aims to end the term “butchering of pigs,” instead advocating the use of “romance baiting” to refer to online scams in which victims are tricked into investing in fake cryptocurrency schemes under the guise of a romantic relationship. “The term ‘pig killer’ dehumanizes and shames the victims of such scams, discouraging people from seeking help and providing information to the authorities,” the agency notes. said in the statement. The word originates from the Chinese phrase “杀猪盘” (“shā zhū pán”), which literally translates to “slaughtering…

Read More

December 18, 2024Ravi LakshmananCyber ​​Attack / Vulnerability Threat actors are attempting to exploit a recently disclosed security flaw affecting Apache Struts that could open the way for remote code execution. Issue tracked as CVE-2024-53677has a CVSS score of 9.5 out of 10.0, indicating critical severity. This vulnerability is similar to another critical bug that the developers of the project fixed in December 2023. (CVE-2023-50164CVSS score: 9.8) that too came under active exploitation shortly after public disclosure. “An attacker could manipulate file download parameters to allow path traversal, and under some circumstances this could lead to the download of a malicious…

Read More