Fri.Oct 04, 2024

article thumbnail

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Tech Republic Security

Check Point documented 5,000 spam emails coming from legitimate-looking domains as fake Microsoft application alerts. Real links complete the trap.

Phishing 200
article thumbnail

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

The Hacker News

Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads.

Passwords 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Setting Up Your Network Security? Avoid These 4 Mistakes

Tech Republic Security

Learn how to execute the fundamentals, harden your defenses, and protect your business's network security with no high-tech software.

article thumbnail

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

The Hacker News

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds.

DDOS 132
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Tech Republic Security

Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them.

Software 153
article thumbnail

Scam Information and Event Management

SecureList

While trying to deliver malware on victims’ devices and stay on them as long as they can, sometimes attackers are using quite unusual techniques. In a recent campaign starting in 2022, unknown malicious actors have been trying to mine cryptocurrency on victims’ devices without user consent; they’ve used large amounts of resources for distribution, but what’s more, used multiple unusual vectors for defense evasion and persistence.

Scams 130

More Trending

article thumbnail

4 Reasons Not to Use a Fax Server and 3 Better Solutions

Tech Republic Security

Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office.

article thumbnail

Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam

Security Boulevard

In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was then stolen, according to a report from Group-IB. The post Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam appeared first on Security Boulevard.

Scams 119
article thumbnail

U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown

The Hacker News

Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country.

article thumbnail

DOJ, Microsoft Take Down Domains Used by Russian-Backed Group

Security Boulevard

The DOJ and Microsoft in a joint effort seized dozens of domains from a Russian-based threat group known as Star Blizzard, which for more than a year was targeting civil society groups like NGOs and journalist as well as government agencies in a spear-phishing campaign aimed at stealing information. The post DOJ, Microsoft Take Down Domains Used by Russian-Backed Group appeared first on Security Boulevard.

Phishing 119
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

Passwords 131
article thumbnail

Sellafield nuclear site hit with £332,500 fine after “significant cybersecurity shortfalls”

Graham Cluley

The UK's Sellafield nuclear waste processing and storage site has been fined £332,500 by regulators after its IT systems were found to have been left vulnerable to hackers and unauthorised access for years. Read more in my article on the Hot for Security blog.

article thumbnail

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

The Hacker News

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and including 6.5.0.2.

111
111
article thumbnail

This Video Game Controller Has Become the US Military’s Weapon of Choice

WIRED Threat Level

After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.

95
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Get Going with CTEM When You Don't Know Where to Start

The Hacker News

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization.

article thumbnail

Why are we still talking about cybersecurity basics after all these years?

Security Boulevard

Cybersecurity basics remain crucial even after decades. Despite technological advances, simple practices like using strong passwords, enabling MFA, and staying alert to phishing are often overlooked due to our fast-paced lives. Slowing down to implement these measures prevents costly breaches and enhances overall security. The post Why are we still talking about cybersecurity basics after all these years?

article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Zero Day

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

article thumbnail

New CUPS Vulnerability Can Amplify DDoS Attacks: Patch Now!

Heimadal Security

A newly discovered vulnerability in the open-source CUPS (Common Unix Printing System) printing system can be used by threat actors to launch DDoS attacks with a 600x amplification factor. Known as CVE-2024-47176, the security flaw in the cups-browsed daemon can be chained to three other bugs to allow threat actors to gain remote code execution […] The post New CUPS Vulnerability Can Amplify DDoS Attacks: Patch Now!

DDOS 83
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

8 Tips to protect your devices from malware attacks

Webroot

Unfortunately, when your devices are infected with a virus, it’s not as easy as a little bed rest for them to recover, and the damage can be long-lasting. A cyberattack can compromise your computers, phones and tablets, and open the door for cyber thieves to steal your sensitive personal information. According to a study by the University of Maryland’s A.

Malware 80
article thumbnail

YouTube Shorts are changing in 5 unique ways, and I love the new creative freedom

Zero Day

YouTube is expanding the runtimes of its short-form content and giving users an easy way to remix their favorite clips.

96
article thumbnail

Open-Source Security Through the Lens of Tidelift

Cisco Security

Cisco is excited to build on our existing relationship with Tidelift by making Tidelift's capabilities available to internal developers across Cisco. Cisco is excited to build on our existing relationship with Tidelift by making Tidelift's capabilities available to internal developers across Cisco.

87
article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Zero Day

Several new features are coming to Facebook, and they may help you explore your local community more.

97
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton

Security Boulevard

At Seceon’s 2024 Innovation and Certification Days, one of the standout sessions was a conversation between Tom Ertel, our SVP of Technical Sales at Seceon, Roger Newton Jr., the brain behind the SOC at Logically. Roger shared some real-world insights into how Logically, one of Seceon’s largest partners, battles ransomware and other cyber threats using The post Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton appeared first on Seceon Inc.

article thumbnail

My favorite USB-C accessory of all time got a magnetic upgrade (and it's 30% off)

Zero Day

USB-C ports can be fragile, and a ripped cord can seriously damage your laptop. This clever MagSafe-like gadget keeps your laptop safe, and is on sale ahead of October Prime Day.

75
article thumbnail

The best resources for CSAM: Resources to send your team this month

Security Boulevard

As Cyber Security Awareness Month (CSAM) kicks off, providing your team with accessible, engaging resources for CSAM is a great way to reinforce cybersecurity best practices. The post The best resources for CSAM: Resources to send your team this month appeared first on Security Boulevard.

article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Zero Day

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

98
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

USENIX NSDI ’24 – MadEye: Boosting Live Video Analytics Accuracy with Adaptive Camera Configurations

Security Boulevard

Authors/Presenters:Mike Wong, Murali Ramanujam, Guha Balakrishnan, Ravi Netravali Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara ; and via the organizations YouTube channel.

64
article thumbnail

One of the best entry-level portable batteries I've tested is $100 off for October Prime Day

Zero Day

If you're looking for a lightweight, portable battery that'll get you out of a pinch without breaking the bank, check out the EcoFlow River 3, especially at only $159 ahead of October Prime Day.

Banking 75
article thumbnail

USENIX NSDI ’24 – Gemino: Practical and Robust Neural Compression for Video Conferencing

Security Boulevard

Authors/Presenters:Vibhaalakshmi Sivaraman, Pantea Karimi, Vedantha Venkatapathy, Mehrdad Khani, Sadjad Fouladi, Mohammad Alizadeh, Frédo Durand, Vivienne Sze Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

64
article thumbnail

The most immersive speaker system I've ever tested is now on sale at Best Buy

Zero Day

The SteelSeries Arena 9 can connect with up to three devices simultaneously, making it an excellent choice for multi-use media spaces. And it's on sale now during Best Buy's competing Prime Day event.

Media 75
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.