Author: nlqip

Registration required to access results of analysis While the service has been made publicly available, CISA is enforcing account registration in order to be able to access the analysis. Any user (and organizations) can submit a threat sample for analysis, but will need to register to see the analytical results from submissions. “Please note, the…

Read More

Apr 12, 2024The Hacker NewsDevSecOps / Identity Management Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access.…

Read More

Smuggling Gold by Disguising it as Machine Parts Someone got caught trying to smuggle 322 pounds of gold (that’s about 1/4 of a cubic foot) out of Hong Kong. It was disguised as machine parts: On March 27, customs officials x-rayed two air compressors and discovered that they contained gold that had been “concealed in…

Read More

Apr 12, 2024NewsroomNetwork Security / Zero-Day Palo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild. Tracked as CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity. “A command injection vulnerability in the GlobalProtect feature of Palo Alto…

Read More

The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. “While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant,” Deep Instinct security researcher Simon…

Read More

This article discusses Google Cloud and Bayer partnering to create a platform that uses artificial intelligence (AI) to analyze medical images. The platform can flag anomalies for radiologists to review and summarize patient medical history. Radiologists are facing a labor shortage and burnout, and this technology is meant to improve efficiency. Google emphasizes that the…

Read More

“High stress, the necessity for ongoing training, and the substantial responsibility of protecting digital assets all play a significant role in the persistent shortage of cybersecurity professionals,” Linder said. Transparency lacking around salary ranges for cyber roles Gender salary discrepancies identified in the ISC2 survey were a mixed bag. Women in non-managerial and middle-manager positions…

Read More

Apr 12, 2024NewsroomWeb Security / WordPress Cybersecurity researchers have discovered a credit card skimmer that’s concealed within a fake Meta Pixel tracker script in an attempt to evade detection. Sucuri said that the malware is injected into websites through tools that allow for custom code, such as WordPress plugins like Simple Custom CSS and JS…

Read More

Apr 11, 2024The Hacker NewsSoftware Security / Programming GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets…

Read More

Apr 12, 2024NewsroomCyber Attack / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an emergency directive (ED 24-02) urging federal agencies to hunt for signs of compromise and enact preventive measures following the recent compromise of Microsoft’s systems that led to the theft of email correspondence with the company. The…

Read More