Trending Articles

article thumbnail

Arguing Against CALEA

Schneier on Security

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically.

article thumbnail

China-based SMS Phishing Triad Pivots to Banks

Krebs on Security

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “ Smishing Triad ” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime infrastructure and support staff.

Phishing 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Cybersecurity For Dummies” Third Edition Now Available

Joseph Steinberg

The third edition of Cybersecurity For Dummies , Joseph Steinberg ‘s best-selling introductory-level book about cybersecurity, is now available in both print and e-book format. Like its prior two counterparts, Cybersecurity For Dummies: Third Edition is written for general audiences, and can help people of all backgrounds stay cyber-secure, regardless of their technical and business skillsets.

article thumbnail

EDR-as-a-Service makes the headlines in the cybercrime landscape

Security Affairs

Cybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platforms According to a detailed analysis conducted by Meridian Group, an increasingly complex and structured phenomenon, commonly referred to as EDR-as-a-Service, is taking hold in the cybersecurity landscape. In a nutshell, some criminal groups are exploiting compromised accounts belonging to law enforcement and other government agencies to illicitly forward Emergency Data R

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Weekly Update 446

Troy Hunt

After an unusually long day of travelling from Iceland, we've finally made it to the land of Guinness, Leprechauns, and a tax haven for tech companies. This week, there are a few more lessons from the successful phish against me the previous week, and in happier news, there is some really solid progress on the HIBP UX rebuild. We spent a bunch of time with Stefan and Ingiber (the guy rebuilding the front end) whilst in Reykjavik and now have a very clear plan mapped out to get this finished

Phishing 159
article thumbnail

News alert: NTT unveils AI inference chip enabling real-time 4K processing of ultra-high-def video

The Last Watchdog

TOKYO, Apr. 10, 2025 Today, NTT Corporation ( NTT ) announced a new, large-scale integration (LSI) for the real-time AI inference processing of ultra-high-definition video up to 4K resolution and 30 frames per second (fps). This low-power technology is designed for edge and power-constrained terminal deployments in which conventional AI inferencing requires the compression of ultra-high-definition video for real-time processing.

LifeWorks

More Trending

article thumbnail

Learning from Troy Hunt’s Sneaky Phish

Adam Shostack

Troy Hunt has a good post about being phished. Good on Troy for being transparent, and he talks about being tired and jet lagged, and that deserves sympathy. Attackers are sneaky. Troy honorably admits that he overrode 1Password and filled out the phishing site. In this post, I want to share why I think I wouldnt fall for this, even jet lagged. That defense is intensive sorting into folders, enabled by custom email addresses.

Phishing 130
article thumbnail

Expert used ChatGPT-4o to create a replica of his passport in just 5 minutes bypassing KYC

Security Affairs

A researcher used ChatGPT-4o to create a replica of his passport in just five minutes, realistic enough to deceive most automated KYC systems. Polish researcher Borys Musielak ( @michuk ) used ChatGPT-4o to generate a fake passport in just five minutes. The document is realistic enough to bypass automated Know Your Customer (KYC) checks, the expert states. “You can now generate fake passports with GPT-4o.

article thumbnail

See No Risk, Hear No Warning, Speak No Breach: The Cybersecurity Trap for Small Businesses

Jane Frankland

Small businesses make up 90% of the global business population. They’re not just the soul of local economiesthey’re essential links in global supply chains and the heartbeat of innovation. Yet in todays AI-driven, connected digital world, many of them are facing a threat theyre reluctant to see, hear, or acknowledge. Just like the three wise monkeys , some small business owners are unintentionally following a philosophy of see no risk, hear no warning, speak no threat when it comes t

article thumbnail

My Take: NTT’s physicists confront the mystery Big Tech keep dodging — what are we really creating?

The Last Watchdog

SAN FRANCISCO If large language AI models are shaping our digital reality, then whoexactlyis shaping those models? And how the heck are they doing it? Related: What exactly is GenAI? Those are the questions Dr. Hidenori Tanaka wants to answer in an effort to put GenAI on solid scientific footing. And its the guiding ethos behind NTT Researchs launch of its newly spun-out Physics of Artificial Intelligence Group , which Tanaka will lead as founding director.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google announces Sec-Gemini v1, a new experimental cybersecurity model

Google Security

Posted by Elie Burzstein and Marianna Tishchenko, Sec-Gemini team Today, were announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers. As outlined a year ago, defenders face the daunting task of securing against all cyber threats, while attackers need to successfully find and exploit only a single vulnerability.

article thumbnail

Tool Poisoning Attacks: Critical Vulnerability Discovered in Model Context Protocol (MCP)

Penetration Testing

Invariant Labs has disclosed a critical vulnerability in the Model Context Protocol (MCP) that enables what they call Tool Poisoning Attacks (TPAs) a class of threats that may allow sensitive data exfiltration, AI behavior hijacking, and even remote code execution via seemingly benign tools used by AI agents. We urge users to exercise caution […] The post Tool Poisoning Attacks: Critical Vulnerability Discovered in Model Context Protocol (MCP) appeared first on Daily CyberSecurity.

article thumbnail

Oracle privately notifies Cloud data breach to customers

Security Affairs

Oracle confirms a cloud data breach, quietly informing customers while downplaying the impact of the security breach. Oracle confirms a data breach and started informing customers while downplaying the impact of the incident. A threat actor using the moniker rose87168 claimed to possess millions of data lines tied to over 140,000 Oracle Cloud tenants, including encrypted credentials.

article thumbnail

Assets, Again

Adam Shostack

What's wrong with this process? Appsec leaders come to me all the time, looking for feedback on their threat modeling approach. When we do it for a customer, the request and response are private, and when they're not, sometimes they end up in the blog. A recent request exemplified a couple of the problems that we see over and over: The system model provides a framework for identifying and analyzing potential threats by thoroughly describing the assets, attributes, and their interactions with

Software 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

News alert: YRIKKA’s ‘Red Teaming’ API advances AI safety, reliability in high-stakes applications

The Last Watchdog

New York, NY, Apr. 3, 2025 YRIKKA has released the first publicly available API for agentic red teaming of Visual AI assets. This release comes at the heels of YRIKKA successfully raising its pre-seed funding round of $1.5M led by Focal and Garuda Ventures. The company was founded by Dr. Kia Khezeli (CEO) and Dr. John Kalantari (CTO), both of whom previously led machine learning projects with the Mayo Clinic, NASA, Intel, and Google.

Media 130
article thumbnail

AI Vulnerability Finding

Schneier on Security

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require physical access to exploit.

260
260
article thumbnail

SureTriggers Vulnerability Exposes 100,000+ WordPress Sites to Admin Takeover

Penetration Testing

A critical vulnerability in the popular WordPress automation plugin SureTriggers has exposed over 100,000 sites to the risk of unauthenticated administrative account creation, potentially allowing full site takeover. The vulnerability, tracked as CVE-2025-3102 with a CVSS score of 8.1, was responsibly disclosed by security researcher mikemyers through the Wordfence Bug Bounty Program.

article thumbnail

AkiraBot: AI-Powered spam bot evades CAPTCHA to target 80,000+ websites

Security Affairs

AkiraBot, a CAPTCHA-evading Python framework, has spammed over 80,000 websites with AI-generated messages, targeting small and medium-sized businesses. SentinelOnes SentinelLabs researchers warn that AkiraBot, a spam framework, targets websites’ chats and contact forms to promote low-quality SEO services, AkiraBot has already targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September 2024.

eCommerce 123
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Xanthorox AI: A New Breed of Malicious AI Threat Hits the Darknet

eSecurity Planet

A new and dangerous AI-powered hacking tool is making waves across the cybercrime underworld and experts say it could change the way digital attacks are launched. Called Xanthorox AI, the tool was first spotted earlier this year on darknet forums and encrypted chat groups, where its being marketed as the killer of WormGPT and all EvilGPT variants. But this isnt just another tweaked version of a chatbot.

article thumbnail

News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed

The Last Watchdog

Austin, TX, USA, April 7, 2025, CyberNewswire — SpyCloud , the leading identity threat protection company, today released new analysis of its recaptured darknet data repository that shows threat actors are increasingly bypassing endpoint protection solutions: 66% of malware infections occur on devices with endpoint security solutions installed.

Antivirus 113
article thumbnail

Embracing the Future: Mastering Your Cybersecurity Strategy With an Identity Driven Security Approach

Security Boulevard

In today's rapidly evolving digital landscape, taking control of your cybersecurity strategy is more crucial than ever. The post Embracing the Future: Mastering Your Cybersecurity Strategy With an Identity Driven Security Approach appeared first on Security Boulevard.

article thumbnail

Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published

Penetration Testing

A security researcher has recently disclosed technical details and proof-of-concept (PoC) exploit code for a vulnerability in the Linux kernel’s Performance Events system component. This flaw, identified as CVE-2023-6931, carries a CVSS score of 7.8, indicating a high severity risk. The vulnerability is described as a heap out-of-bounds write, which can be exploited to achieve […] The post Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published appeare

Risk 107
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

WhatsApp fixed a spoofing flaw that could enable Remote Code Execution

Security Affairs

WhatsApp addressed a flaw, tracked as CVE-2025-30401, that could allow attackers to trick users and enable remote code execution. WhatsApp released a security update to address a vulnerability, tracked as CVE-2025-30401, that could let attackers trick users and enable remote code execution. The spoofing flaw impacts WhatsApp for Windows before version 2.2450.6.

Spyware 103
article thumbnail

Toll fee scams are back and heading your way

Malwarebytes

Back in August 2024, we warned about a relatively new type of SMS phishing (or smishing ) scam that was doing the rounds. Now a new wave of toll fee scams are working their way round the US. These attempts come as an unexpected text message linking to a website pretending to belong to one of the US toll authorities, like E-ZPass, The Toll Roads, SunPass, or TxTag.

Scams 95
article thumbnail

News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises

The Last Watchdog

Luxembourg, Luxembourg, Apr. 9, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity. This comes as organizations face a 56% year-on-year increase in high-volume, complex DDoS attacks that disrupt operations, increase latency, and compromise network security.

DDOS 130
article thumbnail

How ToddyCat tried to hide behind AV software

SecureList

To hide their activity in infected systems, APT groups resort to various techniques to bypass defenses. Most of these techniques are well known and detectable by both EPP solutions and EDR threat-monitoring and response tools. For example, to hide their activity in Windows systems, cybercriminals can use kernel-level rootkits, in particular malicious drivers.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Vidar Stealer Hides in Legitimate BGInfo Tool

Penetration Testing

Vidar Stealer, a notorious information-stealing malware that first emerged in 2018, continues to pose a significant threat by employing new distribution methods and evasion techniques. G DATA Security Lab’s analysis has uncovered a recent instance where Vidar Stealer was disguised within a legitimate system information tool. Vidar Stealer functions as Malware-as-a-Service (MaaS) and is used […] The post Vidar Stealer Hides in Legitimate BGInfo Tool appeared first on Daily CyberSecuri

Malware 109
article thumbnail

A flaw in Verizon’s iOS Call Filter app exposed call records of millions

Security Affairs

A now-patched flaw in Verizon s iOS Call Filter app exposed call records of millions. No abuse found. Only phone numbers and timestamps were at risk. A now-patched vulnerability in Verizon s iOS Call Filter app could have been exploited to harvest the call records of millions of Americans. Verizon’s Call Filter app allows users to identify and manage unwanted calls, such as spam and robocalls.

Wireless 103
article thumbnail

Google fixes two actively exploited zero-day vulnerabilities in Android

Malwarebytes

Google has patched 62 vulnerabilities in Android, including two actively exploited zero-days in its April 2025 Android Security Bulletin. When we say “zero-day” we mean an exploitable software vulnerability for which there was no patch at the time of the vulnerability being exploited or published. The term reflects the amount of time that a vulnerable organization has to protect against the threat by patchingzero days.

Spyware 105
article thumbnail

Cyber Forensic Expert in 2k Cases Faces FBI Probe

Krebs on Security

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI).

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!