Progress quietly fixes MOVEit auth bypass flawsProgress Software has patched one critical and one high-risk vulnerability in MOVEit, its widely used managed file transfer software product.
Open-source Rafel RAT steals info, locks Android devices, asks for ransomThe open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to lock them, encrypt their contents, and demand money to restore the device to its original state.
Leveraging AI and automation for enhanced security operationsIn this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them.
Future trends in cyber warfare: Predictions for AI integration and space-based operationsIn this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern cyber warfare by state and non-state actors.
CISOs' new ally: Qualys CyberSecurity Asset Management 3.0In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0.
Gitleaks: Open-source solution for detecting secrets in your codeGitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories.
Zeek: Open-source network traffic analysis, security monitoringZeek is an open-source network analysis framework.
Unlike an active security device such as a firewall, Zeek operates on a versatile 'sensor' that can be a hardware, software, virtual, or cloud platform.
Cybersecurity jobs available right now: June 26, 2024We've scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field.
Check out this weekly selection of cybersecurity jobs available right now.
Largest Croatian hospital under cyberattackThe University Hospital Centre Zagreb is under cyberattack that started on Wednesday night, the Croatian Radiotelevision has reported.
PoC exploit for critical Fortra FileCatalyst flaw publishedA critical SQL injection vulnerability in Fortra FileCatalyst Workflow has been patched; a PoC exploit is already available online.
Compromised plugins found on WordPress.orgAn unknown threat actor has compromised five WordPress plugins and injected them with code that creates a new admin account, effectively allowing them complete control over WordPress installations / websites.
Ransomware disrupts Indonesia's national data centre, LockBit gang claims US Federal Reserve breachRansomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the operations of 200+ Indonesian government agencies and public services.
Enterprises increasingly turn to cloud and AI for database managementIn this Help Net Security video, Ryan Booz, PostgreSQL Advocate at Redgate, discusses the key findings of Redgate's State of the Database Landscape Report.
1 out of 3 breaches go undetectedOrganizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security tools were unable to detect breaches when they occur, according to Gigamon.
Securing the video market: From identification to disruptionIn this Help Net Security video, Chris White, Chief Architect at Friend MTS, discusses monitoring, identifying, and disrupting piracy for the video market.
75% of new vulnerabilities exploited within 19 daysLast year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes - averaging 600 new vulnerabilities per week, according to Skybox Security.
Developer errors lead to long-term exposure of sensitive data in Git reposCredentials, API tokens, and passkeys - collectively referred to as secrets - from organizations around the globe were exposed for years, according to Aqua Security's latest research.
New infosec products of the week: June 28, 2024Here's a look at the most interesting products from the past week, featuring releases from ARMO, Cofense, Datadog, and eSentire.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Sun, 30 Jun 2024 08:43:05 +0000