Tue.Oct 22, 2024

article thumbnail

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

Schneier on Security

The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” No, it’s not true. This debunking saved me the trouble of writing one. It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion.

article thumbnail

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

Tech Republic Security

A study at Rensselaer Polytechnic Institute presented at ISC2 Security Congress compared ChatGPT-written training prompted by security experts and prompt engineers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Samsung zero-day flaw actively exploited in the wild

Security Affairs

Google’s Threat Analysis Group (TAG) researchers warn of a Samsung zero-day vulnerability that is exploited in the wild. Google’s Threat Analysis Group (TAG) warns of a Samsung zero-day vulnerability, tracked as CVE-2024-44068 (CVSS score of 8.1), which is exploited in the wild. The vulnerability is a use-after-free issue, attackers could exploit the flaw to escalate privileges on a vulnerable Android device.

Firmware 144
article thumbnail

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

WIRED Threat Level

The North Atlantic Fella Organization, which started as a way to fight Kremlin propaganda, has raised millions of dollars to send vital equipment directly to soldiers fighting Russia.

141
141
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

Security Affairs

VMware addressed a remote code execution flaw, demonstrated in a Chinese hacking contest, for the second time in two months. VMware failed to fully address a remote code execution flaw, tracked as CVE-2024-38812 (CVSS score: 9.8), in its vCenter Server platform. In September, Broadcom released security updates to the vulnerability CVE-2024-38812. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

Hacking 140
article thumbnail

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability

The Hacker News

VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol.

Software 122

More Trending

article thumbnail

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

The Hacker News

Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts.

Phishing 117
article thumbnail

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ScienceLogic SL1 flaw CVE-2024-9537 (CVSS v4 score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog. ScienceLogic SL1 contains a vulnerability related to a third-party component.

article thumbnail

Russian Disinformation Group Behind Bogus Walz Conspiracy: Report

Security Boulevard

The Russian disinformation group Storm-1516 reportedly was behind a deepfake video that claimed so show a former student accusing vice presidential candidate Tim Walz of abusing him, the latest incident in a U.S. election season targeted for disruption by Russia, Iran, and China. The post Russian Disinformation Group Behind Bogus Walz Conspiracy: Report appeared first on Security Boulevard.

article thumbnail

A Comprehensive Guide to Finding Service Accounts in Active Directory

The Hacker News

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption

NSTIC

The 16 members of the NIST-managed Internet of Things (IoT) Advisory Board have completed their report on barriers to the U.S. receiving the benefits of IoT adoption, along with their recommendations for overcoming those barriers. As Benson Chan (Chair) and Dan Caprio (Vice Chair) of the IoT Advisory Board state in the report: “The United States is in the early stages of a profound transformation, one that is driven by economic, societal, and cultural innovations brought about by the IoT.

IoT 113
article thumbnail

Malicious npm Packages Target Developers' Ethereum Wallets with SSH Backdoor

The Hacker News

Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol.

Software 105
article thumbnail

Marriott's Breach Saga Underscores Need for Cybersecurity Review

SecureWorld News

Marriott International entered into a $52 million settlement with the U.S. Federal Trade Commission (FTC) to resolve allegations stemming from a massive data breach that affected millions of guests. The breach, which occurred between 2014 and 2018, involved the exposure of sensitive customer information, including names, passport numbers, credit card details, and reservation information.

article thumbnail

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

The Hacker News

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Upload a video selfie to get your Facebook or Instagram account back

Malwarebytes

Meta, the company behind Facebook and Instagram says its testing new ways to use facial recognition—both to combat scams and to help restore access to compromised accounts. The social media giant is testing the use of video selfies and facial recognition to help users get their hijacked accounts back. Social media accounts are often lost when users forget their password, switch devices, or when they inadvertently or even willingly give their credentials to a scammer.

article thumbnail

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

The Hacker News

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro.

98
article thumbnail

AI chatbots can be tricked by hackers into helping them steal your private data

Graham Cluley

Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers to steal personal information from users. The flaw, which has been named "Imprompter", which uses a clever trick to hide malicious instructions within seemingly-random text. Read more in my article on the Hot for Security blog.

article thumbnail

Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote Attackers

The Hacker News

Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Trend Micro

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

article thumbnail

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

DoublePulsar

Yes, I’ve made a logo in crayon and named this FortiJump. Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do. I’ve even made a picture explaining! I give you all rights to use this image. Back on October 13th, I started a Mastodon thread for something I’d come across: Kevin Beaumont (@GossiTheDog@cyberplace.social) The thread is a bit wild, I didn’t know about the FortiNet private notification as I’m just an InfoSec pl

article thumbnail

Finally, an iPhone MagSafe car mount that charges fast while keeping things cool

Zero Day

ESR's latest Qi2 car mount can wirelessly charge your iPhone at 15W while keeping temperatures stabilized, thanks to its CryoBoost feature.

article thumbnail

Exposed United Nations Database Left Sensitive Information Accessible Online

WIRED Threat Level

More than 115,000 files related to UN Women included detailed financial disclosures from organizations around the world—and personal details and testimonials from vulnerable individuals.

Hacking 85
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners

Penetration Testing

In a recent report by Kahng An, part of the Cofense Intelligence Team, a critical vulnerability in the detection capabilities of Secure Email Gateways (SEGs) and antivirus (AV) scanners was... The post Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners appeared first on Cybersecurity News.

article thumbnail

IBM doubles down on open source AI with new Granite 3.0 models

Zero Day

Big Blue's Granite LLMs are built for business and now they're available under the good old Apache 2.0 license.

98
article thumbnail

Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach

Penetration Testing

A new report by the Atlantic Council sheds light on China’s sophisticated and highly structured Capture the Flag (CTF) competition framework, which is helping the country become a global leader... The post Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach appeared first on Cybersecurity News.

Hacking 81
article thumbnail

Ecobee is partnering with Yale and August to expand its home security system

Zero Day

Ecobee is adding extra security measures to its system to create smarter integrations in a single-user experience.

96
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Non-Human Identity in the AI Age: A Technical Deep Dive

Security Boulevard

As artificial intelligence evolves, the concept of "identity" extends beyond humans. This article delves into the technical intricacies of non-human identity in the AI age, exploring how AI systems are identified, authenticated, and managed in a digital world. The post Non-Human Identity in the AI Age: A Technical Deep Dive appeared first on Security Boulevard.

article thumbnail

I actually want to put these $300 sleep earbuds in my ears every night

Zero Day

The Ozlo Sleep earbuds, developed by three ex-Bose engineers, are the best sleep earbuds I've tested.

article thumbnail

DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications

Security Boulevard

DEF CON 32 - Lessons Learned from Building and Defending LLM Applications Authors/Presenters:Javan Rasokat Our sincere appreciation to DEF CON , and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center ; and via the organizations YouTube channel.

article thumbnail

Cryptojacking Alert: Hackers Exploit gRPC and HTTP/2 to Deploy Miners

Penetration Testing

Trend Micro researchers have uncovered a new and unconventional method used by cybercriminals to deploy the SRBMiner cryptominer on Docker remote API servers. This attack leverages the gRPC protocol over... The post Cryptojacking Alert: Hackers Exploit gRPC and HTTP/2 to Deploy Miners appeared first on Cybersecurity News.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.