Tue.Oct 22, 2024

article thumbnail

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

Schneier on Security

The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” No, it’s not true. This debunking saved me the trouble of writing one. It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion.

article thumbnail

Samsung zero-day flaw actively exploited in the wild

Security Affairs

Google’s Threat Analysis Group (TAG) researchers warn of a Samsung zero-day vulnerability that is exploited in the wild. Google’s Threat Analysis Group (TAG) warns of a Samsung zero-day vulnerability, tracked as CVE-2024-44068 (CVSS score of 8.1), which is exploited in the wild. The vulnerability is a use-after-free issue, attackers could exploit the flaw to escalate privileges on a vulnerable Android device.

Firmware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

The reliance on virtual meetings has skyrocketed after the pandemic, making platforms like Google Meet and Zoom integral to our daily personal and professional communication. However, this surge in usage has also opened the door to a growing array of cybersecurity threats. One of the most concerning tactics currently on the rise is the ClickFix campaign — a sophisticated phishing scheme targeting unsuspecting Google Meet users.

Scams 124
article thumbnail

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ScienceLogic SL1 flaw CVE-2024-9537 (CVSS v4 score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog. ScienceLogic SL1 contains a vulnerability related to a third-party component.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Russian Disinformation Group Behind Bogus Walz Conspiracy: Report

Security Boulevard

The Russian disinformation group Storm-1516 reportedly was behind a deepfake video that claimed so show a former student accusing vice presidential candidate Tim Walz of abusing him, the latest incident in a U.S. election season targeted for disruption by Russia, Iran, and China. The post Russian Disinformation Group Behind Bogus Walz Conspiracy: Report appeared first on Security Boulevard.

article thumbnail

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

Security Affairs

VMware addressed a remote code execution flaw, demonstrated in a Chinese hacking contest, for the second time in two months. VMware failed to fully address a remote code execution flaw, tracked as CVE-2024-38812 (CVSS score: 9.8), in its vCenter Server platform. In September, Broadcom released security updates to the vulnerability CVE-2024-38812. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Hacking 140

LifeWorks

More Trending

article thumbnail

Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach

Penetration Testing

A new report by the Atlantic Council sheds light on China’s sophisticated and highly structured Capture the Flag (CTF) competition framework, which is helping the country become a global leader... The post Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach appeared first on Cybersecurity News.

Hacking 83
article thumbnail

Can Cybersecurity Make You a Millionaire?

Hacker's King

The world of cybersecurity is booming, with digital threats increasing and businesses needing to protect their data. But can cybersecurity make you a millionaire ? The answer is, yes, it can, provided you navigate the field strategically. As the demand for cybersecurity professionals continues to rise, so do the financial opportunities for those who excel in this domain.

article thumbnail

6 Breach and Attack Simulation Use Cases That Enhance Your Cyber Resilience

NetSpi Executives

TL;DR The breach and attack simulation (BAS) market is projected to experience substantial growth over the next several years. As the market grows, it’s important to understand that breach and attack simulation offers more than security control validation. Breach and attack simulation tools also support business use cases, including strategic security planning, demonstrating ROI, optimizing red team exercises, and supporting continuous threat exposure management.

article thumbnail

ShadyShader: Crashing Apple M-Series Devices with a Single Click

Security Boulevard

Introduction A while ago, we discovered an interesting vulnerability in Apple’s M-series chips that allowed us to freeze and crash Apple devices by exploiting a flaw in the GPU’s driver. This vulnerability, which we’ve dubbed ShadyShader, leverages a shader program that overloads Apple’s GPU, triggering temporary freezes that add up to a crash. Apple issued […] The post ShadyShader: Crashing Apple M-Series Devices with a Single Click appeared first on Blog.

64
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability

The Hacker News

VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol.

Software 135
article thumbnail

MixMode Recognized By USA Today As One Of The Top 10 AI Companies To Watch in 2024

Security Boulevard

MixMode has been recognized by USA Today as one of the Top 10 AI Companies to Watch in 2024. This prestigious acknowledgment highlights MixMode’s vital contributions to cybersecurity and ability to shape the industry's future through advanced AI. The post MixMode Recognized By USA Today As One Of The Top 10 AI Companies To Watch in 2024 appeared first on Security Boulevard.

article thumbnail

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

The Hacker News

Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts.

Phishing 132
article thumbnail

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

WIRED Threat Level

The North Atlantic Fella Organization, which started as a way to fight Kremlin propaganda, has raised millions of dollars to send vital equipment directly to soldiers fighting Russia.

131
131
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Comprehensive Guide to Finding Service Accounts in Active Directory

The Hacker News

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges.

article thumbnail

Marriott's Breach Saga Underscores Need for Cybersecurity Review

SecureWorld News

Marriott International entered into a $52 million settlement with the U.S. Federal Trade Commission (FTC) to resolve allegations stemming from a massive data breach that affected millions of guests. The breach, which occurred between 2014 and 2018, involved the exposure of sensitive customer information, including names, passport numbers, credit card details, and reservation information.

article thumbnail

Malicious npm Packages Target Developers' Ethereum Wallets with SSH Backdoor

The Hacker News

Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol.

Software 121
article thumbnail

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Trend Micro

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

The Hacker News

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT.

Phishing 117
article thumbnail

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

DoublePulsar

Yes, I’ve made a logo in crayon and named this FortiJump. Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do. I’ve even made a picture explaining! I give you all rights to use this image. Back on October 13th, I started a Mastodon thread for something I’d come across: Kevin Beaumont (@GossiTheDog@cyberplace.social) The thread is a bit wild, I didn’t know about the FortiNet private notification as I’m just an InfoSec pl

Firewall 100
article thumbnail

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

The Hacker News

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro.

114
114
article thumbnail

IBM doubles down on open source AI with new Granite 3.0 models

Zero Day

Big Blue's Granite LLMs are built for business and now they're available under the good old Apache 2.0 license.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote Attackers

The Hacker News

Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes.

article thumbnail

Finally, an iPhone MagSafe car mount that charges fast while keeping things cool

Zero Day

ESR's latest Qi2 car mount can wirelessly charge your iPhone at 15W while keeping temperatures stabilized, thanks to its CryoBoost feature.

article thumbnail

AI chatbots can be tricked by hackers into helping them steal your private data

Graham Cluley

Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers to steal personal information from users. The flaw, which has been named "Imprompter", which uses a clever trick to hide malicious instructions within seemingly-random text. Read more in my article on the Hot for Security blog.

article thumbnail

I actually want to put these $300 sleep earbuds in my ears every night

Zero Day

The Ozlo Sleep earbuds, developed by three ex-Bose engineers, are the best sleep earbuds I've tested.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners

Penetration Testing

In a recent report by Kahng An, part of the Cofense Intelligence Team, a critical vulnerability in the detection capabilities of Secure Email Gateways (SEGs) and antivirus (AV) scanners was... The post Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners appeared first on Cybersecurity News.

article thumbnail

4 ways Android cameras are about to get better, thanks to Qualcomm - even for dogs

Zero Day

Photobombers and videobombers, goodbye. Tell your dogs we said hi, though.

98
article thumbnail

Cryptojacking Alert: Hackers Exploit gRPC and HTTP/2 to Deploy Miners

Penetration Testing

Trend Micro researchers have uncovered a new and unconventional method used by cybercriminals to deploy the SRBMiner cryptominer on Docker remote API servers. This attack leverages the gRPC protocol over... The post Cryptojacking Alert: Hackers Exploit gRPC and HTTP/2 to Deploy Miners appeared first on Cybersecurity News.

article thumbnail

Ecobee is partnering with Yale and August to expand its home security system

Zero Day

Ecobee is adding extra security measures to its system to create smarter integrations in a single-user experience.

96
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!