Trending Articles

article thumbnail

Cell Phone OPSEC for Border Crossings

Schneier on Security

I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about securing computers, but very little about securing phones. Are there easy ways to delete data—files, photos, etc.—on phones so it can’t be recovered? Does resetting a phone to factory defaults erase data, or is it still recoverable?

article thumbnail

Appsec Roundup - March 2025

Adam Shostack

Big news for LLMs in threat modeling! Threat Modeling Matthew Adams introduced TM-Bench The World's First LLM Threat Modeling Benchmark. Im glad to see this, testing and evaluation is important. Tony Lee has released DeepTM , a tool for chaining threat models. (Tony was nice enough to help me find the core code for the agents.) As a general comment on these systems, LLMs are tremendously reactive to very small wording changes.

147
147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 445

Troy Hunt

Well, this certainly isn't what I expected to be talking about this week! But I think the fact it was someone most people didn't expect to be on the receiving end of an attack like this makes it all the more consumable. I saw a lot of "if it can happen to Troy, it can happen to anyone" sort of commentary and whilst it feels a bit of obnoxious for me to be saying it that way, I appreciate the sentiment and the awareness it drives.

Phishing 205
article thumbnail

News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus

The Last Watchdog

Palo Alto, Calif., Mar 28, 2025, CyberNewswire — From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ransom each year, but the greater cost often comes from the reputational damage and operational disruption caused by the attack.

Antivirus 147
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Why we’re no longer doing April Fools’ Day 

Malwarebytes

The internet is filled with falsehoods. Were forever investigating new scams here at Malwarebytes, and so we get how hard it is to know whator whoto trust online. Theres the scam that takes advantage of grieving people and tricks them into paying for a funeral live stream. Theres the fake CAPTCHA that hijacks clipboards and tricks users into installing malware.

Scams 138
article thumbnail

CISA warns of RESURGE malware exploiting Ivanti flaw

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns of RESURGE malware, targeting a vulnerability in Ivanti Connect Secure (ICS) appliances. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (MAR) on a new malware called RESURGE. The malicious code has been used in attacks targeting the flaw CVE-2025-0282 in Ivanti Connect Secure (ICS) appliances.

Malware 121

LifeWorks

More Trending

article thumbnail

App Stores OK’ed VPNs Run by China PLA

Security Boulevard

Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN appswith over a million downloads. The post App Stores OKed VPNs Run by China PLA appeared first on Security Boulevard.

VPN 121
article thumbnail

Hacker Leaks 270,000 Samsung Customer Records—Stolen Credentials Were Left Unchecked for Years

eSecurity Planet

In a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias GHNA, occurred when the attacker accessed a system used by Samsungs German customer service. According to cybersecurity firm Hudson Rock, the hack was made possible by a set of stolen credentials compromised in 2021.

article thumbnail

CrushFTP CVE-2025-2825 flaw actively exploited in the wild

Security Affairs

Attackers exploit CrushFTP CVE-2025-2825 flaw, enabling unauthenticated access to unpatched devices using public proof-of-concept code. Threat actors are exploiting a critical authentication bypass vulnerability, tracked as CVE-2025-2825 , in the CrushFTP file transfer software. Attackers are using exploits based on publicly available proof-of-concept exploit code.

article thumbnail

Web 3.0 Requires Data Integrity

Schneier on Security

If you’ve ever taken a computer security class, you’ve probably learned about thethree legs of computer security—confidentiality, integrity, and availability—known as the CIA triad. When we talk about a system being secure, that’s what we’re referring to. All are important, but to different degrees in different contexts.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

3 Ways the UK Government Plans to Tighten Cyber Security Rules with New Bill

Tech Republic Security

Amid a sharp spike in ransomware attacks disrupting essential services and critical infrastructure, the U.K. government has set out the scope of its upcoming Cyber Security and Resilience Bill for the first time. It aims to patch the holes in the countrys existing cyber regulations and protect critical infrastructure from ransomware and other attack types.

article thumbnail

World Backup Day: A Clarion Call for Cyber Resilience

SecureWorld News

Each year on March 31st, just before April Fool's Day, cybersecurity professionals, IT teams, and business leaders alike are reminded of a simple truth: data loss isn't a matter of if, but when. World Backup Day is more than a calendar curiosityit's a call to action. In a digital world defined by ransomware, cloud sprawl, and hybrid infrastructures, the ability to recover data quickly and securely is one of the most important indicators of an organization's cyber resilience.

Backups 92
article thumbnail

Scammers Target Netflix Users: Expert Issues Urgent Warning

eSecurity Planet

Streaming giant Netflix is at the center of a rising wave of online scams, cybersecurity experts warn. Fraudsters use increasingly sophisticated tactics from fake texts to deceptive emails and websites to steal Netflix users personal and financial information. With over 230 million subscribers worldwide, Netflix has become one of the most impersonated brands by cybercriminals.

Scams 90
article thumbnail

New advanced FIN7’s Anubis backdoor allows to gain full system control on Windows

Security Affairs

FIN7 cybercrime group has been linked to Anubis, a Python-based backdoor that provides remote access to compromised Windows systems. The threat actor FIN7 , also known as Savage Ladybug, has developed a new Python-based malware, named Anubis Backdoor, which allows attackers to gain full remote control over infected Windows systems. It executes shell commands and system operations while using obfuscation to evade detection.

Antivirus 127
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Top 5 Web Application Penetration Testing Companies UK

IT Security Guru

Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can exploit them. This proactive process allows businesses to address security flaws early and maintain a strong defense against potential cyber threats.

article thumbnail

“Urgent reminder” tax scam wants to phish your Microsoft credentials

Malwarebytes

Tax season is in full force, and with the filing deadline fast approaching on April 15, scammers are happy to use that sense of urgency to coax us into handing them our cash. In one example, one of our customers recently received an email with an attachment titled “Urgent reminder. The attachment was a PDF file with a QR code in it. Tax Services Department Important Tax Review and Update Required by 2025-03-16!

Scams 84
article thumbnail

Online Scams in the Age of AI

Security Boulevard

The question is no longer whether AI-driven scams will target your business, but how prepared you are to counter them. The post Online Scams in the Age of AI appeared first on Security Boulevard.

Scams 90
article thumbnail

TookPS: DeepSeek isn’t the only game in town

SecureList

In early March, we published a study detailing several malicious campaigns that exploited the popular DeepSeek LLM as a lure. Subsequent telemetry analysis indicated that the TookPS downloader , a malware strain detailed in the article, was not limited to mimicking neural networks. We identified fraudulent websites mimic official sources for remote desktop and 3D modeling software, alongside pages offering these applications as free downloads.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Apache Tomcat path equivalence vulnerability, tracked as CVE-2025-24813 , to its Known Exploited Vulnerabilities (KEV) catalog. The Apache Tomcat vulnerability CVE-2025-24813 was recently disclosed and is being actively exploited just 30 hours after a public PoC was released.

Firewall 108
article thumbnail

Top 10 Patch My PC Alternatives for Automated Patching

Heimadal Security

Keeping Windows applications up to date is a challenge, and Patch My PC seems to be a favorite for automating the process. Some of its users praise the solutions lightweight agent and strong third-party app support. However, this tool also has its downsides: a reviewer on G2 says that only one user can be in […] The post Top 10 Patch My PC Alternatives for Automated Patching appeared first on Heimdal Security Blog.

87
article thumbnail

Popular VPNs are routing traffic via Chinese companies, including one with link to military

Malwarebytes

Up to one in five of the most popular mobile VPNs for iOS last year are owned by Chinese companies that do their best to hide the fact. In at least one case, the owner is on a US blacklist. That’s according to a report from the non-profit Tech Transparency Project (TTP), who investigated the top 100 mobile VPN apps downloaded from Apple’s App Store as documented by mobile intelligence company AppMagic.

VPN 84
article thumbnail

UK Cybersecurity Weekly News Roundup – 31 March 2025

Security Boulevard

UK Cybersecurity Weekly News Roundup - 31 March 2025 Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Warned of Inadequate Readiness Against State-Backed Cyberattacks Cybersecurity experts have sounded the alarm over the UK's growing vulnerability to state-sponsored cyber threats.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service

DoublePulsar

Being a provider of cloud SaaS (Software-as-a-service) solutions requires certain cybersecurity responsibilitiesincluding being transparent and open. The moment where this is tested at Oracle has arrived, as they have a serious cybersecurity incident playing out in a service they manage for customers. Back on March 21st, Bleeping Computer ran a story around a threat actor named rose87168 claiming to have breached some Oracle services inside *.oraclecloud.com Oracle told Bleeping Computer, and cu

article thumbnail

U.S. CISA adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Cisco Smart Licensing Utility vulnerability, tracked as CVE-2024-20439 , to its Known Exploited Vulnerabilities (KEV) catalog. Last week, Cisco disclosed two vulnerabilities in its Smart Licensing Utility: CVE-2024-20439, a static credential backdoor, and CVE-2024-20440, an inf

Software 109
article thumbnail

EU Pumps €1.3 Billion into Cybersecurity, AI, and Digital Skills to Fortify Europe’s Tech Future

eSecurity Planet

The European Commission is making a massive 1.3 billion ($1.4 billion) bet on Europes digital future, with a strong focus on shoring up cybersecurity defenses, boosting artificial intelligence, and closing the digital skills gap. The funding, part of the Digital Europe Programme (DIGITAL) for 2025-2027, aims to strengthen Europes tech sovereignty and protect critical infrastructure from growing cyber threats.

article thumbnail

“Nudify” deepfakes stored unprotected online

Malwarebytes

Yesterday, we told you about how millions of pictures from specialized dating apps had been stored online without any kind of password protection. Now it’s the turn of an AI “nudify” service. A researcher, famous for finding unprotected cloud storage buckets, has uncovered an unprotected AWS bucket belonging to the nudify service. The rising popularity of these nudify services apparently has caused a selection of companies without any security awareness to hop on the money trai

Media 87
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CVE-2025-22457: UNC5221 Exploits Ivanti Zero-Day Flaw to Deploy TRAILBLAZE and BRUSHFIRE Malware

Penetration Testing

Ivanti has recently disclosed a critical security vulnerability, identified as CVE-2025-22457, affecting several of its widely-used products. The The post CVE-2025-22457: UNC5221 Exploits Ivanti Zero-Day Flaw to Deploy TRAILBLAZE and BRUSHFIRE Malware appeared first on Daily CyberSecurity.

Malware 82
article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

The latest wave of privacy litigation doesn't involve data breaches, AI models, or spyware. It involves tracking pixelsand legal theories pulled from a time when Blockbuster Video was still a thing. Companies across industries are being sued for using widely available web technologies: session replay tools, analytics platforms, and advertising trackers.

article thumbnail

Sam’s Club Investigates Alleged Cl0p Ransomware Breach

Security Affairs

The Walmart-owned membership warehouse club chain Sams Club is investigating claims of a Cl0p ransomware security breach. Sam’s Club is a membership warehouse club chain in the United States, owned by Walmart. Founded in 1983 by Sam Walton, Walmart’s founder, asSam’s Wholesale Club, it was renamed Sam’s Club in 1990. These stores operate on a bulk retail model, offering members discounted prices on a wide range of products, including electronics, clothing, food, and house

article thumbnail

Is There a Robot in Your Future?

Lohrman on Security

Recent developments in humanoid robots are grabbing plenty of global attention. Here are some intriguing robot developments and why we all need to pay attention.

194
194
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!