Geek-Guy.com

Category: Global Security News

Hersteller von Geräten für die Herzchirurgie angegriffen

Cyberkriminelle üben immer häufiger Druck auf den Gesundheitssektor aus – sei es durch den Diebstahl von Daten oder Angriffe auf Zulieferer. Germany only – metamorworks/shutterstock.com Der Schutz der KRITIS wird in Deutschland seit Jahren gefordert und gefördert, macht dabei aber nicht in allen Sektoren die gewünschten Fortschritte. So trifft es insbesondere Gesundheitsversorger wie Krankenhäuser immer…

Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia

A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023. The espionage campaign targeted organizations in various sectors spanning government ministries in two different countries, an air traffic control organization, a telecoms company, and a media outlet, the Symantec Threat…

Rumänien kommt digital weiterhin nicht zur Ruhe

Nehmen die Russen Rache an Rumänien für die gescheiterte Wahl „ihres“ Kandidaten? structuresxx – shutterstock.com Zuerst wurde die rumänischen Präsidentschaftswahlen annulliert, nachdem sie durch eine mutmaßlich russisch gesteuerte TikTok-Kampagne beeinflusst wurden. Jetzt wurde die Electrica-Gruppe, ein wichtiger Stromanbieter mit 3,8 Millionen Kunden in Rumänien, Opfer eines Ransomware-Angriffs. Der Angriff dauert an Wie das Unternehmen am…

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020. Guan Tianfeng (aka gbigmao and gxiaomao), who is said to have worked at Sichuan Silence Information Technology Company, Limited, has been charged with conspiracy to commit computer fraud and conspiracy to commit…

Salt Typhoon poses a serious supply chain risk to most organizations

In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports of malicious activities targeting multiple US telecommunications companies. The agency determined that Chinese-affiliated actors had stolen many communications records related to several unidentified individuals during what they later realized was a persistent infiltration dating back at least two years.…

Bug bounty programs can deliver significant benefits, but only if you’re ready

Bug bounty programs, which offer financial incentives to outside security researchers to find software vulnerabilities, seem like a 21st-century phenomenon, but according to bug bounty platform provider HackerOne, the first bug bounty program dates back to 1983.   That year, a company called Hunter & Ready offered $1,000 to those who found “errors” in its…

Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities

Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and Connect Secure products that could lead to privilege escalation and code execution. The list of vulnerabilities is as follows – CVE-2024-11639 (CVSS score: 10.0) – An authentication bypass vulnerability in the admin web console of Ivanti CSA before…

Patch Tuesday, December 2024 Edition

Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138, a security weakness in the Windows Common Log File System (CLFS) driver — used by applications to write transaction logs — that…

Microsoft closes 2024 with extensive security update

In its final Patch Tuesday update of 2024, Microsoft has addressed 71 new security vulnerabilities, including a zero-day flaw that is currently being actively exploited.  The zero-day vulnerability, documented as CVE-2024-49138, is a bug in the company’s Windows Common Log File System (CLFS). It poses a significant threat as it enables attackers to achieve system-level…

Microsoft closes 2024 with extensive security update

In its final Patch Tuesday update of 2024, Microsoft has addressed 71 new security vulnerabilities, including a zero-day flaw that is currently being actively exploited.  The zero-day vulnerability, documented as CVE-2024-49138, is a bug in the company’s Windows Common Log File System (CLFS). It poses a significant threat as it enables attackers to achieve system-level…

Itron’s low voltage distributed energy Resource Management System to manage rooftop solar generation in Australia

Data-Driven Solution to Enable Jemena, at AEMO’s Direction, to Remotely Manage Consumer Energy Resources for Energy System Reliability COMPANY NEWS: Itron Inc, which is innovating new ways for utilities and cities to manage energy and water, is collaborating with Jemena, a provider of gas and electricity services to millions of customers in Australia, to deploy…

Itron’s low voltage distributed energy Resource Management System to manage rooftop solar generation in Australia

Data-Driven Solution to Enable Jemena, at AEMO’s Direction, to Remotely Manage Consumer Energy Resources for Energy System Reliability COMPANY NEWS: Itron Inc, which is innovating new ways for utilities and cities to manage energy and water, is collaborating with Jemena, a provider of gas and electricity services to millions of customers in Australia, to deploy…

Itron’s low voltage distributed energy Resource Management System to manage rooftop solar generation in Australia

Data-Driven Solution to Enable Jemena, at AEMO’s Direction, to Remotely Manage Consumer Energy Resources for Energy System Reliability COMPANY NEWS: Itron Inc, which is innovating new ways for utilities and cities to manage energy and water, is collaborating with Jemena, a provider of gas and electricity services to millions of customers in Australia, to deploy…

Salus Ventures adds three highly strategic advisors to its team

Salus Ventures, Australia’s largest venture capital fund with a focus on national resilience, has launched its Strategic Advisor Program, making three significant appointments to its team. These include: Paul Symon AO, the former Director-General of the Australian Secret Intelligence Service and Deputy Chief of Army. The Hon. Arthur Sinodinos AO, previous Ambassador to the US…

Salus Ventures adds three highly strategic advisors to its team

Salus Ventures, Australia’s largest venture capital fund with a focus on national resilience, has launched its Strategic Advisor Program, making three significant appointments to its team. These include: Paul Symon AO, the former Director-General of the Australian Secret Intelligence Service and Deputy Chief of Army. The Hon. Arthur Sinodinos AO, previous Ambassador to the US…

Salus Ventures adds three highly strategic advisors to its team

Salus Ventures, Australia’s largest venture capital fund with a focus on national resilience, has launched its Strategic Advisor Program, making three significant appointments to its team. These include: Paul Symon AO, the former Director-General of the Australian Secret Intelligence Service and Deputy Chief of Army. The Hon. Arthur Sinodinos AO, previous Ambassador to the US…

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat actors exploiting the issue en masse on December 3, 2024. The vulnerability, which impacts…

GoTo Adds AI Capabilities Plus Automation, Management to Resolve & Rescue

Communications and IT management vendor GoTo announced additions to the GoTo Resolve and LogMeIn Rescue solutions aimed at streamlining IT processes. The solutions now include enhanced AI capabilities, streamlined IT workflows, and improvements to device management tools. “At GoTo, we’re committed to delivering innovative IT management and support solutions that empower teams to work smarter,”…

GoTo Adds AI Capabilities Plus Automation, Management to Resolve & Rescue

Communications and IT management vendor GoTo announced additions to the GoTo Resolve and LogMeIn Rescue solutions aimed at streamlining IT processes. The solutions now include enhanced AI capabilities, streamlined IT workflows, and improvements to device management tools. “At GoTo, we’re committed to delivering innovative IT management and support solutions that empower teams to work smarter,”…

GoTo Adds AI Capabilities Plus Automation, Management to Resolve & Rescue

Communications and IT management vendor GoTo announced additions to the GoTo Resolve and LogMeIn Rescue solutions aimed at streamlining IT processes. The solutions now include enhanced AI capabilities, streamlined IT workflows, and improvements to device management tools. “At GoTo, we’re committed to delivering innovative IT management and support solutions that empower teams to work smarter,”…

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as recruiters, luring unsuspecting victims with job offers,” Zimperium zLabs Vishnu Pratapagiri researcher said in a new report. “As part of their fraudulent hiring process, the

The Future of Network Security: Automated Internal and External Pentesting

In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs, resource requirements, and infrequent implementation. Automated internal and external network pentesting is a game-changing solution, empowering organizations to stay

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service providers in Southern Europe as part of a campaign codenamed Operation Digital Eye. The intrusions took place from late June to mid-July 2024, cybersecurity companies SentinelOne SentinelLabs and Tinexta Cyber said in a joint report shared with The…

Blue Mantis Acquires Colligio, Creates Collaboration Practice

Mergers and acquisitions between solutions providers continue to reshape the channel landscape. Following the November acquisition of Colligio by Blue Mantis, Colligio founder and President Sean Kelley spoke with Channel Insider about the M&A process and the shared commitment to customers between both organizations. Colligio brings Cisco competencies and communications expertise to Blue Mantis offerings…

Blue Mantis Acquires Colligio, Creates Collaboration Practice

Mergers and acquisitions between solutions providers continue to reshape the channel landscape. Following the November acquisition of Colligio by Blue Mantis, Colligio founder and President Sean Kelley spoke with Channel Insider about the M&A process and the shared commitment to customers between both organizations. Colligio brings Cisco competencies and communications expertise to Blue Mantis offerings…

Blue Mantis Acquires Colligio, Creates Collaboration Practice

Mergers and acquisitions between solutions providers continue to reshape the channel landscape. Following the November acquisition of Colligio by Blue Mantis, Colligio founder and President Sean Kelley spoke with Channel Insider about the M&A process and the shared commitment to customers between both organizations. Colligio brings Cisco competencies and communications expertise to Blue Mantis offerings…

Intel’s US Channel Chief on Buying Habits & 2025 Partner Plans

Intel veteran Michael Green’s role as US channel chief expanded into an additional role as North American general manager of partner scale earlier this year. Green spoke with Channel Insider to explain how he approaches the Intel channel, where he sees key opportunities for partners, and how the company can adjust to new buying habits…

Intel’s US Channel Chief on Buying Habits & 2025 Partner Plans

Intel veteran Michael Green’s role as US channel chief expanded into an additional role as North American general manager of partner scale earlier this year. Green spoke with Channel Insider to explain how he approaches the Intel channel, where he sees key opportunities for partners, and how the company can adjust to new buying habits…

Intel’s US Channel Chief on Buying Habits & 2025 Partner Plans

Intel veteran Michael Green’s role as US channel chief expanded into an additional role as North American general manager of partner scale earlier this year. Green spoke with Channel Insider to explain how he approaches the Intel channel, where he sees key opportunities for partners, and how the company can adjust to new buying habits…

Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI

Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack. Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found…

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. “Proxy malware and services enable other types of criminal activity adding uncontrolled layers of anonymity to the threat actors, so they can perform all kinds of malicious activity using chains of victim systems,” the company’s security research…

WordPress Appliance - Powered by TurnKey Linux