Aggregator
Absolute Security releases Enterprise Edition
Absolute Security launched Enterprise Edition, combining the new Safe Connect for Secure Access and Comply Module for Secure Endpoint. With these innovations, Enterprise Edition is the comprehensive Security Service Edge (SSE) that can ensure only secure and compliant devices are accessing corporate networks, while delivering an optimized user experience for remote and hybrid workers. Backed by firmware-embedded resilience, customers are assured their SSE remains resilient, always on, and fully operational. “Hybrid work, complexity, ransomware, and … More →
The post Absolute Security releases Enterprise Edition appeared first on Help Net Security.
Emerging Threats: Cybersecurity Forecast 2025
Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission.
This year’s report draws on insights directly from Google Cloud's security leaders, as well as dozens of analysts, researchers, responders, reverse engineers, and other experts on the frontlines of the latest and largest attacks.
- aside_block
- <ListValue: [StructValue([('title', 'Cybersecurity Forecast 2025'), ('body', <wagtail.rich_text.RichText object at 0x3e680327a040>), ('btn_text', 'Download now'), ('href', 'https://cloud.google.com/security/resources/cybersecurity-forecast?utm_source=cgc-blog&utm_medium=blog&utm_campaign=FY24-Q4-global-MAND1370-website-dl-dgcsm-security-forecast-2025&utm_content=cgc-blog&utm_term=-'), ('image', <GAEImage: Cybersecurity Forecast 2025 cover>)])]>
Built on trends we are already seeing today, the Cybersecurity Forecast 2025 report provides a realistic outlook of what organizations can expect to face in the coming year. The report covers a lot of topics across all of cybersecurity, with a focus on various threats such as:
-
Attacker Use of Artificial Intelligence (AI): Threat actors will increasingly use AI for sophisticated phishing, vishing, and social engineering attacks. They will also leverage deepfakes for identity theft, fraud, and bypassing security measures.
-
AI for Information Operations (IO): IO actors will use AI to scale content creation, produce more persuasive content, and enhance inauthentic personas.
-
The Big Four: Russia, China, Iran, and North Korea will remain active, engaging in espionage operations, cyber crime, and information operations aligned with their geopolitical interests.
-
Ransomware and Multifaceted Extortion: Ransomware and multifaceted extortion will continue to be the most disruptive form of cyber crime, impacting various sectors and countries.
-
Infostealer Malware: Infostealer malware will continue to be a major threat, enabling data breaches and account compromises.
-
Democratization of Cyber Capabilities: Increased access to tools and services will lower barriers to entry for less-skilled actors.
-
Compromised Identities: Compromised identities in hybrid environments will pose significant risks.
-
Web3 and Crypto Heists: Web3 and cryptocurrency organizations will increasingly be targeted by attackers seeking to steal digital assets.
-
Faster Exploitation and More Vendors Targeted: The time to exploit vulnerabilities will continue to decrease, and the range of targeted vendors will expand.
Read the Cybersecurity Forecast 2025 report for a more in-depth look at these and other threats, as well as other security topics such as post-quantum cryptography, and insights unique to the JAPAC and EMEA regions.
For an even deeper look at the threat landscape next year, register for our Cybersecurity Forecast 2025 webinar, which will be hosted once again by threat expert Andrew Kopcienski.
For even more insights, hear directly from our security leaders: Charles Carmakal, Sandra Joyce, Sunil Potti, and Phil Venables.
New ShrinkLocker ransomware decryptor recovers BitLocker password
终端对抗防御逃逸-内存免杀
SpaceX 计划测试 Starship 在轨加油
dnstwist:一款针对域名安全的多功能检测工具
安全KER助力金山 × Hacking Group首届联合沙龙圆满举办!
Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims
GoIssue phishing tool targets GitHub developer credentials
Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while keeping their identity hidden using proxies. The tool’s capabilities extend beyond simple phishing, posing a threat to entire organizations by potentially hijacking developer accounts and accessing private repositories. GoIssue may be linked to the GitLoker extortion campaign, which uses … More →
The post GoIssue phishing tool targets GitHub developer credentials appeared first on Help Net Security.
CVE-2024-10852 | Buy One Click WooCommerce Plugin up to 2.2.9 on WordPress Setting Export authorization
CVE-2024-10778 | BuddyPress Builder for Elementor Plugin up to 1.7.4 on WordPress Post information disclosure
CVE-2024-10717 | Styler for Ninja Forms Plugin up to 3.3.4 on WordPress Option deactivate_license access control
CVE-2024-10629 | GPX Viewer Plugin up to 2.2.8 on WordPress access control
CVE-2024-10038 | WP-Strava Plugin up to 2.12.1 on WordPress cross site scripting
CVE-2024-10577 | Fat Rat Collect Plugin up to 2.7.3 on WordPress cross site scripting
CVE-2024-43451 | Microsoft Windows up to Server 2025 NTLM Hash file inclusion
CVE-2015-6908 | OpenLDAP up to 2.4.42 libraries/liblber/io.c ber_get_next BER input validation (RHSA-2015:1840 / EDB-38145)
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the globe. Last month researchers discovered an infection chain where fake CAPTCHA pages are being utilized to distribute Lumma Stealer malware, which has climbed to 4th place in the monthly top malware rankings. This campaign is notable for its global reach, … More →
The post Infostealers increasingly impact global security appeared first on Help Net Security.