Hacker accessed PowerSchool’s network months before massive December breach

CrowdStrike says a hacker had access to PowerSchool’s internal system as far back as August.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.

The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Following takedown operation, Garantex invites customers to ‘face-to-face’ Moscow meeting

Russian crypto exchange Garantex has yet to directly address the international law enforcement operation that resulted in the seizure of its domains, and criminal charges against two of its administrators.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on.
“The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to

The Hacker News – ​Read More

Google Chrome is killing more extensions than you think – is your old favorite on the list?

Google’s Manifest V3 platform is clobbering many popular extensions. Here’s why and what you can do about it.

Latest stories for ZDNET in Security – ​Read More

Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.

The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.

SecurityWeek – ​Read More

When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts

In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.

darkreading – ​Read More

Developer Convicted for Hacking Former Employer’s Systems

Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data.

The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.

SecurityWeek – ​Read More

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024.
“The campaign, which leverages social media to distribute malware, is tied to the region’s current geopolitical climate,” Positive Technologies researchers Klimentiy Galkin and Stanislav Pyzhov said in an analysis published last week.

The Hacker News – ​Read More

Mass Exploitation of Critical PHP Vulnerability Begins

GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.

The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.

SecurityWeek – ​Read More