Considerations for Operational Technology Cybersecurity

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security

The Hacker News – ​Read More

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks.
The technique has been codenamed HTTP/2 CONTINUATION Flood by security researcher Bartek Nowotarski, who reported the issue to the CERT Coordination Center (CERT/CC) on January 25, 2024.
“Many HTTP/2 implementations do not properly limit or sanitize the

The Hacker News – ​Read More

Microsoft Exchange State-Linked Hack Entirely Preventable, Cyber Review Board Finds

The China-affiliated threat actor Microsoft identified as Storm-0558 compromised the Microsoft Exchange Online mailboxes of 22 organizations and more than 500 individuals in the attacks, which began in May 2023.

Cyware News – Latest Cyber News – ​Read More

Pixel Phone Zero-Days Exploited by Forensic Firms

Google this week patched two Pixel phone zero-day vulnerabilities actively exploited by forensic companies to obtain data from devices.

The post Pixel Phone Zero-Days Exploited by Forensic Firms appeared first on SecurityWeek.

SecurityWeek – ​Read More

Get a Lifetime of VPN Protection for Just $16

During a special sale event, you can get an extra 20% off our already discounted price on RealVPN, bringing it down to just $16 for life. Use code SECURE20 at checkout.

Security | TechRepublic – ​Read More

New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset

New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks.

The post New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset appeared first on SecurityWeek.

SecurityWeek – ​Read More

Zoom Paid Out $10 Million via Bug Bounty Program Since 2019

Video conferencing giant Zoom has paid out $10 million through its bug bounty program since it was launched in 2019.

The post Zoom Paid Out $10 Million via Bug Bounty Program Since 2019 appeared first on SecurityWeek.

SecurityWeek – ​Read More

Magento Shoplift Malware Targets Both WordPress and Magento CMS on E-Commerce Sites

While it pretends to be a Google Analytics script, this is merely a distraction from the true nature of the credit card skimming JavaScript code snippet embedded in the infected website.

Cyware News – Latest Cyber News – ​Read More

Google Fixed Another Chrome Zero-Day Exploited at Pwn2Own

The vulnerability CVE-2024-3159 is an out-of-bounds memory access in the V8 JavaScript engine. The flaw was demonstrated by Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) of Palo Alto Networks during the Pwn2Own 2024 on March 22, 2024.

Cyware News – Latest Cyber News – ​Read More

Rhadamanthys Stealer Delivered in Transportation Campaign

The phishing emails use a unique vehicle incident lure and, in later stages of the infection chain, spoof the Federal Bureau of Transportation in a PDF that mentions a significant fine for the incident.

Cyware News – Latest Cyber News – ​Read More