Cyber Security News Weekly Round-Up

The weekly cybersecurity news wrap-up provides readers with the latest information on emerging risks, vulnerabilities, ways to reduce them, and harmful schemes to help make defensive measures proactive.
According to recent findings from Morphisec Threat Labs' cyber security analysts, hackers are currently carrying out Steganography malware hiding technique in PNG files.
This campaign highlights the changing landscape of cyber threats and reinforces the message that organizations and individuals need to maintain alertness, update their security solutions, and equip themselves with knowledge about these threats.
The incident has raised concerns about national security implications, especially for federal organizations hence the issuance of an emergency directive from CISA. Microsoft has attempted to reduce the risk by alerting all federal agencies affected by these breaches and imposing distinct guidelines aimed at enhancing security in their systems.
A Fortinet Forticlient EMS vulnerability is a security hole that threat actors have exploited to plant unsanctioned RMM and PowerShell backdoor on machines.
This occurrence stresses on the need for strong cyber security by companies holding customers' delicate identities.
Security experts keep on insisting that for boAt's transparent and proactive response such as contacting all affected users, thoroughly investigating the range covered by the breach, and changing security protocols to protect against future vulnerabilities.
The Common Vulnerability Scoring System has assigned high severity scores to them, showing that these security vulnerabilities are indeed very serious.
The report indicates Cisco IOS software for Catalyst 6000 series switches has a severe security vulnerability, which could result in a denial of service attack.
Internet security professionals and experts are concerned about this vulnerability that prevents HTTP/2 from processing a large number of request related headers, while vendors have come out with different responses.
At the risk of data thefts and malware downloads, it is an information security vulnerability that allows for remote code execution.
Bitdefender Labs discovered critical security vulnerabilities in over 90,000 LG smart TVs using WebOS, potentially allowing unauthorized access to the TV and home network.
LG has been working on a patch to address these vulnerabilities, highlighting the importance of ensuring devices receive automatic updates to apply the security fix once released.
Those running applications with Node.js on their Windows platform should upgrade now, review security measures, and keep up with new updates as well as advisories regarding security issues.
Bitdefender vulnerabilities report indicates that Bitdefender's GravityZone Update Server, Endpoint Security for Linux, and Endpoint Security for Windows have critical security flaws.
To prevent these dangers, users are recommended to switch to patched versions of Bitdefender Endpoint Security for Linux version 7.0.5.200090, Endpoint Security for Windows version 7.9.9.381 and GravityZone Control Center version 6.36.1-1 respectively.
The U.S. Cybersecurity and Infrastructure Security Agency placed this bug into its Known Exploited Vulnerabilities catalog with federal agencies required to apply patches by April 19.
One of the biggest security updates in Microsoft's history was addressed by Patch Tuesday in April 149 bugs were fixed with this update, including vulnerabilities like Office, SQL Server, and Windows OS and Azure having nine CVEs.
These vulnerabilities which are named CVE-2023-6317 to CVE-2023-6320 allow for unauthorized root access which exposes a compromise in privacy and security.
Chrome has presented a new security feature called V8 Sandbox that is meant to combat memory corruption vulnerabilities.


This Cyber News was published on cybersecuritynews.com. Publication date: Sun, 14 Apr 2024 15:10:38 +0000


Cyber News related to Cyber Security News Weekly Round-Up

Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
11 months ago Cyberdefensemagazine.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
6 months ago Cyberdefensemagazine.com Akira
Mississippi Creates New Cyber Unit and Names First Director - The state of Mississippi has recently announced the creation of a new dedicated cyber security unit, as well as the naming of its first director. The Mississippi Cyber Security Unit, headed by Director Kelly Hurst and backed by the Mississippi Office ...
2 years ago Securityweek.com
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
10 months ago Therecord.media
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
1 year ago Securityboulevard.com Rocke
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
2 years ago Securityweek.com
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business - Cyber security is no longer just about keeping systems and devices safe, it's also become central in enabling business to achieve their strategic objectives. Paul Brucciani, Cyber Security Advisor at WithSecure™, has important information about ...
1 year ago Cyberdefensemagazine.com
Cyber Security News Weekly Round-Up - The weekly cybersecurity news wrap-up provides readers with the latest information on emerging risks, vulnerabilities, ways to reduce them, and harmful schemes to help make defensive measures proactive. According to recent findings from Morphisec ...
11 months ago Cybersecuritynews.com CVE-2023-6317 CVE-2023-6320
The top cyber security news stories of 2023 - 2023 was a busy year for cyber criminals, making it tough to choose the top cyber security news stories of 2023. Cyber security professionals have had their hands full in protecting sensitive information and detecting breaches to ensure the safety of ...
1 year ago Securityboulevard.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
North Korea Launches New Military Based Research Center To Strengthen Hacking Capabilities - The center is designed to research and develop international cyber hacking technologies, representing a substantial shift in the country’s approach to information warfare. The establishment of Research Center 227 comes amid increasing ...
2 weeks ago Cybersecuritynews.com
Top Cybersecurity Tools of 2025 To Managing Remote Device Threats - Microsoft Defender for Endpoint is an enterprise-grade security solution that protects remote devices through AI-driven threat detection, automated response mechanisms, and seamless integration with Microsoft’s security ecosystem. By leveraging ...
3 weeks ago Cybersecuritynews.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
6 months ago Helpnetsecurity.com
Cybersecurity Tops 2024 Global Business Risks - The newly released Allianz Risk Barometer revealed that Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally, as well as in the United States, in 2024. The 13th annual business ...
1 year ago Cybersecurity-insiders.com
Meet Your New Cybersecurity Auditor: Your Insurer - As businesses deal with the fallout of massive ransomware waves, from Lapsus$ to Cl0p/MOVEit, an unlikely new entity is joining the regulatory bodies to raise the bar for cybersecurity: the cyber insurer. Their coverage requirements and ...
1 year ago Darkreading.com LAPSUS$
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
4 weeks ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
1 year ago Securityzap.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
6 months ago Cyberdefensemagazine.com
75% Organizations Struggle with Recurring Cyber Attacks - In a time when advancements in technology rule these days, the constant risk of cyber attacks hangs over businesses all over the world. This study highlighted the difficulties Chief Information Security Officers encounter during cyber attacks. This ...
1 year ago Securityboulevard.com
AI Helps With the Implementation of Simulated Cyber Defense Techniques - We are going to emphasize the importance of using AI to simulate cyber threats to help both humans and machine learning tools prepare for them more effectively. To extend their understanding beyond conventional strategies, many organizations are now ...
1 year ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)