Latest Cybersecurity News and Articles


Chinese Telco Gear May Get Banned in Germany

21 May 2024
Germany is considering banning the use of Huawei and ZTE equipment in its 5G networks due to national security concerns, despite industry opposition and the potential high costs associated with the removal of the Chinese-made technology.

CISA Warns of Actively Exploited NextGen Mirth Connect Pre-Auth RCE Vulnerability

21 May 2024
The CISA has required federal agencies to update to a patched version of Mirth Connect (version 4.4.1 or later) by June 10, 2024, to secure their networks against active threats.

Achieve security compliance with Wazuh File Integrity Monitoring

21 May 2024
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning and verifying their integrity. Most information security standards mandate the use of FIM for businesses to ensure the integrity of their data. IT security compliance involves adhering to

Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox

21 May 2024
A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by threat actors to achieve arbitrary code execution. Tracked as CVE-2024-34359 (CVSS score: 9.7), the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx. "If exploited, it could allow attackers to execute arbitrary code on your system,

Streamlining IT Security Compliance Using the Wazuh FIM Capability

21 May 2024
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning and verifying their integrity. Most information security standards mandate the use of FIM for businesses to ensure the integrity of their data. IT security compliance involves adhering to

Consumers Continue to Overestimate Their Ability to Spot Deepfakes

21 May 2024
The Jumio 2024 Online Identity Study reveals that while consumers are increasingly concerned about the risks posed by deepfakes and generative AI, they continue to overestimate their ability to detect these deceptions.

'Linguistic Lumberjack' Flaw in Logging Utility Fluent Bit Impacts Cloud Services

21 May 2024
Cybersecurity researchers have discovered a critical vulnerability, dubbed "Linguistic Lumberjack," in the popular logging and metrics utility Fluent Bit that could allow for denial-of-service (DoS), information disclosure, or remote code execution.

The Mystery of the Targeted Ad and the Library Patron

21 May 2024
An attorney discovered that the mobile ads she saw were reflecting her recent library audiobook borrowing habits, raising concerns about the privacy of library patron data and the potential for targeted advertising based on that information.

North Korea-Linked Kimsuky APT Attack Targets Victims via Messenger

21 May 2024
Researchers at Genians Security Center (GSC) identified the North Korea-linked Kimsuky APT group targeting victims via Facebook Messenger, using fake accounts posing as South Korean officials to deliver malware.

Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

21 May 2024
 Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the second half of the year, as it announced a slew of new security measures to harden the widely-used desktop operating system. "Deprecating NTLM has been a huge ask from our security community as it will strengthen user authentication, and deprecation is planned in the second half of 2024," the

Cybercriminals Shift Tactics to Pressure More Victims Into Paying Ransoms

21 May 2024
Cybercriminals' new tactics led to a 64% increase in ransomware claims in 2023, driven by a 415% rise in "indirect" incidents and remote access vulnerabilities, pressuring more victims to pay ransoms, according to At-Bay.

Fortinet FortiSIEM Command Injection Flaw (CVE-2023-34992) Deep-Dive

21 May 2024
Researchers at Horizon3.ai discovered a critical remote code execution vulnerability (CVE-2023-34992) in Fortinet FortiSIEM, allowing unauthenticated attackers to execute commands as root users and gain access to sensitive information.

CyberArk Snaps up Venafi for $1.54B to Ramp up in Machine-to-Machine Security

21 May 2024
The acquisition will allow CyberArk to expand its capabilities in securing machine-to-machine communications and address the growing attack surface in the cloud-first, AI-driven, and post-quantum world.

GitCaught Campaign Leverages GitHub Repositories and Fake Profiles for Malicious Infrastructure

21 May 2024
Insikt Group uncovered a sophisticated campaign led by Russian-speaking actors who used GitHub profiles to spoof legitimate software apps and distribute various malware, including Atomic macOS Stealer (AMOS) and Vidar.

NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning

21 May 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaw, tracked as CVE-2023-43208 (CVSS score: N/A), concerns a case of unauthenticated remote code execution arising from an incomplete

"Linguistic Lumberjack" Vulnerability Discovered in Popular Logging Utility Fluent Bit

21 May 2024
Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote code execution. The vulnerability, tracked as CVE-2024-4323, has been codenamed Linguistic Lumberjack by Tenable Research. It impacts versions from 2.0.7 through

Data protection top motivator for cloud-based backup

21 May 2024
A recent report found that the top drivers for cloud-based backup are the desire to integrate cyber technologies with data protection and backup.

Chinese Duo Indicted for Laundering $73m in Pig Butchering Case

20 May 2024
Two Chinese nationals have been indicted for their alleged involvement in a multimillion-dollar "pig butchering" investment fraud scheme, where they laundered over $73 million through US financial institutions and cryptocurrency wallets.

Too Many ICS Assets are Exposed to the Public Internet

20 May 2024
The enterprise attack surface is rapidly expanding due to the convergence of IT and OT systems, leading to a large number of ICS assets being exposed to the public internet and creating new vulnerabilities that security teams struggle to manage.

Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

20 May 2024
An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind destructive wiping attacks targeting Albania and Israel under the personas Homeland Justice and Karma, respectively. Cybersecurity firm Check Point is tracking the activity under the moniker Void Manticore, which is also known as Storm-0842 (formerly DEV-0842) by