Wed.Mar 26, 2025

article thumbnail

AI Data Poisoning

Schneier on Security

Cloudflare has a new feature —available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots, Cloudflare’s new system lures them into a “maze” of realistic-looking but irrelevant pages, wasting the crawler’s computing resources. The approach is a notable shift from the standard block-and-defend strategy used by most website protection services.

314
314
article thumbnail

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority

The Last Watchdog

It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses scramble to stabilize critical patients without access to real-time data. Admissions come to a standstill.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security expert Troy Hunt hit by phishing attack

Malwarebytes

Internet security expert and educator Troy Hunt disclosed this week that he had been hit by one of the oldestand most provenscams in the online world: A phishing attack. Through an automated attack disguised as a notice from Hunts chosen newsletter provider Mailchimp, scammers stole roughly 16,000 records belonging to current and past subscribers of Hunts blog.

Phishing 114
article thumbnail

Google fixed the first actively exploited Chrome zero-day since the start of the year

Security Affairs

Google fixed a flaw in the Chrome browser for Windows that was actively exploited in attacks targeting organizations in Russia. Google has released out-of-band fixes to address a high-severity security vulnerability, tracked as CVE-2025-2783 , in Chrome browser for Windows. The flaw was actively exploited in attacks targeting organizations in Russia.

Hacking 115
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

DeepSeek users targeted with fake sponsored Google ads that deliver malware

Malwarebytes

The threat intel research used in this post was provided by Malwarebytes Senior Director of Research, Jrme Segura. DeepSeeks rising popularity has not only raised concerns and questions about privacy implications , but cybercriminals are also using it as a lure to trap unsuspecting Google searchers. Unfortunately, we are getting so used to sponsored Google search results being abused by criminals that we advise people not to click on them.

article thumbnail

Introducing the DEF CON 32 Hackers' Almanack

Adam Shostack

Grateful to introduce the Hackers' Almanack! I wrote the introduction for The DEF CON 32 Hackers Almanack ! Every year, thousands of hackers converge in Las Vegas for a joyous, crazy exploration of the edges of technology otherwise fondly called Hacker Summer Camp. They include many communities with different perspectives, all with a core commitment to hacking and exploration.

LifeWorks

More Trending

article thumbnail

Q&A: Cybersecurity in ‘The Intelligent Era’

IT Security Guru

The Gurus spoke to Robert Hann, VP of Technical Solutions at Entrust, about the future of IT and the challenges these developments pose to security teams and business leaders globally. What do you think will be the most significant changes in the IT industry over the next 5-10 years? I believe the three most influential and interconnected evolutions that will transform the IT industry throughout the next decade are AI, Robotics and Quantum Computing.

article thumbnail

Authentication bypass CVE-2025-22230 impacts VMware Windows Tools

Security Affairs

Broadcom addressed a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230, in VMware Tools for Windows. Broadcom released security updates to address a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230 (CVSS score 9.8), impacting VMware Tools for Windows. VMware Tools for Windows is a suite of utilities that enhances the performance and usability of virtual machines (VMs) running on VMware hypervisors like VMware Workstation, Fusion, and vSphere

article thumbnail

Don’t Respond to Ransomware Attackers With AI, Experts Say

eSecurity Planet

When in a stressful situation, your brain can feel scrambled, making it hard to think clearly about the next move. Turning to an artificial intelligence chatbot like ChatGPT for help might be tempting. But if ransomware attackers threaten you, that may not be a good idea. Typically, AI is not sensitive enough to pick up on human emotion or provide the necessary nuance required to connect with threat actors and diffuse the situation, and this is where it can escalate, Moty Cristal, from ransomwar

article thumbnail

BlackLock Ransomware Targeted by Cybersecurity Firm

Security Affairs

Resecurity found an LFI flaw in the leak site of BlackLock ransomware, exposing clearnet IPs and server details. Resecurity has identified a Local File Include (LFI) vulnerability in Data Leak Site (DLS) of BlackLock Ransomware. Cybersecurity experts were able to exploit misconfiguration in vulnerable web-app used by ransomware operators to publish victims data – leading to clearnet IP addresses disclosure related to their network infrastructure behind TOR hidden services (hosting them) an

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication

Tech Republic Security

CVE-2025-22230 is described as an "authentication bypass vulnerability" by Broadcom, allowing hackers to perform high-privilege operations without the necessary credentials.

article thumbnail

New ReaderUpdate malware variants target macOS users

Security Affairs

New ReaderUpdate malware variants, now written in Crystal, Nim, Rust, and Go, targets macOS users, SentinelOne warns. SentinelOne researchers warn that multiple versions of the ReaderUpdate malware written in Crystal, Nim, Rust, and Go programming languages, are targeting macOS users. ReaderUpdate is a macOS malware loader that has been active since 2020, the malicious code was first seen as a compiled Python binary and was spotted delivering Genieo adware. it remained largely undetected until r

Malware 69
article thumbnail

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

Security Boulevard

The United Kingdoms National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum computing. Titled Timelines for Migration to Post-Quantum Cryptography, this guidance is important for two key reasons: A) It sets a clear roadmap for [] The post The UKs National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration appeared first on Security Bou

article thumbnail

Coffee with the Council Podcast: Guidance for PCI DSS E-commerce Requirements Effective After 31 March 2025

PCI perspectives

Welcome to our podcast series, Coffee with the Council. I'm Alicia Malone, Director of Communications and Public Relations for the PCI Security Standards Council. As many of our listeners are aware, we are quickly approaching the deadline to adopt the future-dated requirements of PCI DSS version 4.0.1 on March 31st, 2025. Over the course of the last year, the Council has received feedback that more guidance was needed to properly implement some of the e-commerce security requirements in the stan

Risk 63
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

Security Boulevard

Recently, two critical security flaws were discovered in Kentico Xperience 13, a popular digital experience platform (CMS). Tracked as CVE-2025-2746 and CVE-2025-2747, these vulnerabilities allow unauthenticated attackers to bypass the Staging Sync Servers authentication, potentially gaining administrative control over the CMS. Both issues carry a CVSS score of 9.8 (Critical) (Warning: Multiple Critical & High.

article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

If there is one statistic that sums up the increasing pace of technological change, it might well be this. Gartner forecasts that by 2026, more than 80 per cent of businesses will implement Generative AI in their production environments. To put this into context, GenAI use in business was just 5 per cent in 2023, the research company said. This rapid transformation creates a challenge for boards tasked with balancing emerging risks and strategic opportunities.

article thumbnail

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority

Security Boulevard

It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses scramble to stabilize critical patients (more) The post GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority first appeared on The Last Watchdog.

article thumbnail

How to transform your old, obsolete Kindle into the ultimate open-source reader

Zero Day

Your old Kindle's not dead yet; it's just waiting for a jailbreak. Let me show you how it's done.

126
126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Do You Own Your Permissions, or Do Your Permissions Own You?

Security Boulevard

tl;dr: Less FPs for Owns/WriteOwner and new Owns/WriteOwnerLimitedRights edges Before we get started, if youd prefer to listen to a 10-minute presentation instead of or to supplement reading this post, please check out the recording of our most recent BloodHound Release Recap webinar. You can also sign up for future webinars here. Back in August, a BloodHound Enterprise (BHE) customer told us that they had implemented an Active Directory (AD) setting called BlockOwnerImplicitRights to help addre

article thumbnail

Titan Security Keys now available in more countries

Google Security

Posted by Christiaan Brand, Group Product Manager Were excited to announce that starting today, Titan Security Keys are available for purchase in more than 10 new countries: Ireland Portugal The Netherlands Denmark Norway Sweden Finland Australia New Zealand Singapore Puerto Rico This expansion means Titan Security Keys are now available in 22 markets, including previously announced countries like Austria, Belgium, Canada, France, Germany, Italy, Japan, Spain, Switzerland, the UK, and the US.

article thumbnail

Securing Canada’s Digital Backbone: Navigating API Compliance

Security Boulevard

Highlights: Understanding Canadian API Standards: Key principles for secure government API development. Critical Importance of API Security: Why robust protection is vital for citizen data. Compliance and Trust: How adherence to standards builds public confidence. Key Security Considerations: Essential practices for Canadian organizations. Salt Security's Alignment: How the Salt API Security Platform supports Canadian government API security regulations.

article thumbnail

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations

The Hacker News

The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely shared by Chinese state-sponsored actors.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Broadcom Extends Scope of VMware vDefend Cybersecurity Platform

Security Boulevard

Broadcom today updated its VMware vDefend platform to add additional security intelligence capabilities along with a streamlined ability to micro-segment networks using code to programmatically deploy virtual firewalls. Additionally, Broadcom has made it simpler to deploy and scale out the Security Services Platform (SSP) it uses to provide a data lake for collecting telemetry data.

article thumbnail

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

The Hacker News

Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis.

article thumbnail

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #330 — AI For Job Hunting

Security Boulevard

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agil ! Permalink The post Comic Agil – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #330 — AI For Job Hunting appeared first on Security Boulevard.

article thumbnail

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

The Hacker News

The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor's tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

BSidesLV24 – IATC – Hungry, Hungry Hackers

Security Boulevard

Authors/Presenters: Sick.Codes, Casey John Ellis Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Hungry, Hungry Hackers appeared first on Security Boulevard.

article thumbnail

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

The Hacker News

The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates.

Malware 104
article thumbnail

BSidesLV24 – IATC – Difficult Conversations

Security Boulevard

Author/Presenter: Andrea M. Matwyshyn Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – IATC – Difficult Conversations appeared first on Security Boulevard.

article thumbnail

Linux kernel 6.14 is a big leap forward in performance and Windows compatibility

Zero Day

The new release is finally here with cutting-edge features that should please gamers.

103
103
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!