500ms to midnight: XZ / liblzma backdoor

SAMIR BOUSSEADEN•MIKA AYENSON•JAKE KING: Elastic Security Labs is releasing an initial analysis of the XZ Utility backdoor, including YARA rules, osquery, and KQL searches to identify potential compromises. Key Takeaways On March 29, 2024, Andres Freund identified malicious commits to the command-line utility XZ, impacting versions 5.6.0 and 5.6.1 for Linux, and shared the information on the oss-security mailing list. Andres’ discovery was made after an increase of 500ms in latency was […]

read more

Data Confirms A Surge In WordPress Vulnerabilities

SEJ STAFF-Roger Montti: It’s not your imagination. Report confirms an increase in WordPress vulnerabilities and they’re higher in severity WordPress security researchers at Patchstack published their annual State of WordPress Security whitepaper that showed an increase of high and critical severity vulnerabilities, highlighting the importance of security for all websites on the WordPress platform. XSS Is Top WordPress Vulnerability Of 2023 There are many kinds of vulnerabilities but the most […]

read more

2M+ WordPress Sites Hit By Essential Addons For Elementor Vulnerability

SEJ STAFF-Roger Montti: XSS vulnerabilities in Essential Addons for Elementor could allow attackers to inject malicious scripts into WordPress websites Security researchers published an advisory on the popular Essential Addons For Elementor WordPress plugin which was discovered to contain a Stored Cross-Site Scripting vulnerability affecting over 2 million websites. Flaws in two different widgets that are a part of the plugin are responsible for the vulnerabilities. Two Widgets That Lead […]

read more

Hackers Transform The Raspberry Pi Into An Online Anonymity Tool

ByBalaji: A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS locations, emulate network settings, mimic Wi-Fi access points, and bypass anti-fraud filters. Criminals were using multiple GEOBOX devices as proxies to enhance anonymity during an online banking theft investigation. Attackers are believed to utilize more custom-made or modified devices in the future, creating challenges for […]

read more

Hackers steal Windows NTLM authentication hashes in phishing attacks

By Bill Toulas The hacking group known as TA577 has recently shifted tactics by using phishing emails to steal NT LAN Manager (NTLM) authentication hashes to perform account hijacks. TA577 is considered an initial access broker (IAB), previously associated with Qbot and linked to Black Basta ransomware infections. Email security firm Proofpoint reports today that although it has seen TA577 showing a preference for deploying Pikabot recently, two recent attack waves demonstrate […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights