Tue.Oct 22, 2024

article thumbnail

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

Schneier on Security

The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” No, it’s not true. This debunking saved me the trouble of writing one. It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion.

article thumbnail

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

Tech Republic Security

A study at Rensselaer Polytechnic Institute presented at ISC2 Security Congress compared ChatGPT-written training prompted by security experts and prompt engineers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ScienceLogic SL1 flaw CVE-2024-9537 (CVSS v4 score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog. ScienceLogic SL1 contains a vulnerability related to a third-party component.

article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

The reliance on virtual meetings has skyrocketed after the pandemic, making platforms like Google Meet and Zoom integral to our daily personal and professional communication. However, this surge in usage has also opened the door to a growing array of cybersecurity threats. One of the most concerning tactics currently on the rise is the ClickFix campaign — a sophisticated phishing scheme targeting unsuspecting Google Meet users.

Scams 122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Samsung zero-day flaw actively exploited in the wild

Security Affairs

Google’s Threat Analysis Group (TAG) researchers warn of a Samsung zero-day vulnerability that is exploited in the wild. Google’s Threat Analysis Group (TAG) warns of a Samsung zero-day vulnerability, tracked as CVE-2024-44068 (CVSS score of 8.1), which is exploited in the wild. The vulnerability is a use-after-free issue, attackers could exploit the flaw to escalate privileges on a vulnerable Android device.

Firmware 145
article thumbnail

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

WIRED Threat Level

The North Atlantic Fella Organization, which started as a way to fight Kremlin propaganda, has raised millions of dollars to send vital equipment directly to soldiers fighting Russia.

145
145

More Trending

article thumbnail

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability

The Hacker News

VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol.

Software 140
article thumbnail

Exposed United Nations Database Left Sensitive Information Accessible Online

WIRED Threat Level

More than 115,000 files related to UN Women included detailed financial disclosures from organizations around the world—and personal details and testimonials from vulnerable individuals.

Hacking 129
article thumbnail

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

The Hacker News

Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts.

Phishing 140
article thumbnail

Russian Disinformation Group Behind Bogus Walz Conspiracy: Report

Security Boulevard

The Russian disinformation group Storm-1516 reportedly was behind a deepfake video that claimed so show a former student accusing vice presidential candidate Tim Walz of abusing him, the latest incident in a U.S. election season targeted for disruption by Russia, Iran, and China. The post Russian Disinformation Group Behind Bogus Walz Conspiracy: Report appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A Comprehensive Guide to Finding Service Accounts in Active Directory

The Hacker News

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges.

article thumbnail

Upload a video selfie to get your Facebook or Instagram account back

Malwarebytes

Meta, the company behind Facebook and Instagram says its testing new ways to use facial recognition—both to combat scams and to help restore access to compromised accounts. The social media giant is testing the use of video selfies and facial recognition to help users get their hijacked accounts back. Social media accounts are often lost when users forget their password, switch devices, or when they inadvertently or even willingly give their credentials to a scammer.

article thumbnail

Malicious npm Packages Target Developers' Ethereum Wallets with SSH Backdoor

The Hacker News

Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol.

Software 131
article thumbnail

Marriott's Breach Saga Underscores Need for Cybersecurity Review

SecureWorld News

Marriott International entered into a $52 million settlement with the U.S. Federal Trade Commission (FTC) to resolve allegations stemming from a massive data breach that affected millions of guests. The breach, which occurred between 2014 and 2018, involved the exposure of sensitive customer information, including names, passport numbers, credit card details, and reservation information.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

The Hacker News

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT.

Phishing 129
article thumbnail

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Trend Micro

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

article thumbnail

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

The Hacker News

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro.

126
126
article thumbnail

IBM doubles down on open source AI with new Granite 3.0 models

Zero Day

Big Blue's Granite LLMs are built for business and now they're available under the good old Apache 2.0 license.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote Attackers

The Hacker News

Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes.

article thumbnail

Finally, an iPhone MagSafe car mount that charges fast while keeping things cool

Zero Day

ESR's latest Qi2 car mount can wirelessly charge your iPhone at 15W while keeping temperatures stabilized, thanks to its CryoBoost feature.

article thumbnail

AI chatbots can be tricked by hackers into helping them steal your private data

Graham Cluley

Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers to steal personal information from users. The flaw, which has been named "Imprompter", which uses a clever trick to hide malicious instructions within seemingly-random text. Read more in my article on the Hot for Security blog.

article thumbnail

I actually want to put these $300 sleep earbuds in my ears every night

Zero Day

The Ozlo Sleep earbuds, developed by three ex-Bose engineers, are the best sleep earbuds I've tested.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

DoublePulsar

Yes, I’ve made a logo in crayon and named this FortiJump. Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do. I’ve even made a picture explaining! I give you all rights to use this image. Back on October 13th, I started a Mastodon thread for something I’d come across: Kevin Beaumont (@GossiTheDog@cyberplace.social) The thread is a bit wild, I didn’t know about the FortiNet private notification as I’m just an InfoSec pl

article thumbnail

4 ways Android cameras are about to get better, thanks to Qualcomm - even for dogs

Zero Day

Photobombers and videobombers, goodbye. Tell your dogs we said hi, though.

98
article thumbnail

Empowering future cybersecurity experts: our partnership with Gwinnett County

CompTIA on Cybersecurity

Discover how high schoolers in Gwinnett County are becoming the next generation of cybersecurity professionals.

article thumbnail

Ecobee is partnering with Yale and August to expand its home security system

Zero Day

Ecobee is adding extra security measures to its system to create smarter integrations in a single-user experience.

96
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption

NSTIC

The 16 members of the NIST-managed Internet of Things (IoT) Advisory Board have completed their report on barriers to the U.S. receiving the benefits of IoT adoption, along with their recommendations for overcoming those barriers. As Benson Chan (Chair) and Dan Caprio (Vice Chair) of the IoT Advisory Board state in the report: “The United States is in the early stages of a profound transformation, one that is driven by economic, societal, and cultural innovations brought about by the IoT.

IoT 114
article thumbnail

Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach

Penetration Testing

A new report by the Atlantic Council sheds light on China’s sophisticated and highly structured Capture the Flag (CTF) competition framework, which is helping the country become a global leader... The post Inside China’s State-Sponsored Hacking Competitions: Talent Spotting and Global Outreach appeared first on Cybersecurity News.

Hacking 82
article thumbnail

AT&T and T-Mobile argue unlocked phones are bad for their customers - here's why

Zero Day

The FCC wants all phones to be unlocked after 60 days. Two major mobile carriers do not, but Verizon isn't one of them. Here are their arguments.

Mobile 76
article thumbnail

Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners

Penetration Testing

In a recent report by Kahng An, part of the Cofense Intelligence Team, a critical vulnerability in the detection capabilities of Secure Email Gateways (SEGs) and antivirus (AV) scanners was... The post Virtual Hard Drives: The New Bypass for Secure Email Gateways and Antivirus Scanners appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.