Fri.Oct 04, 2024

article thumbnail

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Tech Republic Security

Check Point documented 5,000 spam emails coming from legitimate-looking domains as fake Microsoft application alerts. Real links complete the trap.

Phishing 124
article thumbnail

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

The Hacker News

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds.

DDOS 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Tech Republic Security

Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them.

Software 120
article thumbnail

U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown

The Hacker News

Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Setting Up Your Network Security? Avoid These 4 Mistakes

Tech Republic Security

Learn how to execute the fundamentals, harden your defenses, and protect your business's network security with no high-tech software.

article thumbnail

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

The Hacker News

Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads.

Passwords 105

More Trending

article thumbnail

Sellafield nuclear site hit with £332,500 fine after “significant cybersecurity shortfalls”

Graham Cluley

The UK's Sellafield nuclear waste processing and storage site has been fined £332,500 by regulators after its IT systems were found to have been left vulnerable to hackers and unauthorised access for years. Read more in my article on the Hot for Security blog.

article thumbnail

4 Reasons Not to Use a Fax Server and 3 Better Solutions

Tech Republic Security

Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office.

article thumbnail

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

The Hacker News

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and including 6.5.0.2.

89
article thumbnail

This Video Game Controller Has Become the US Military’s Weapon of Choice

WIRED Threat Level

After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.

90
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Biggest Ever DDoS is Threat to OT Critical Infrastructure

Security Boulevard

Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS). The post Biggest Ever DDoS is Threat to OT Critical Infrastructure appeared first on Security Boulevard.

DDOS 87
article thumbnail

How to Get Going with CTEM When You Don't Know Where to Start

The Hacker News

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization.

article thumbnail

Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam

Security Boulevard

In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was then stolen, according to a report from Group-IB. The post Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam appeared first on Security Boulevard.

Scams 74
article thumbnail

8 Tips to protect your devices from malware attacks

Webroot

Unfortunately, when your devices are infected with a virus, it’s not as easy as a little bed rest for them to recover, and the damage can be long-lasting. A cyberattack can compromise your computers, phones and tablets, and open the door for cyber thieves to steal your sensitive personal information. According to a study by the University of Maryland’s A.

Malware 72
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

DOJ, Microsoft Take Down Domains Used by Russian-Backed Group

Security Boulevard

The DOJ and Microsoft in a joint effort seized dozens of domains from a Russian-based threat group known as Star Blizzard, which for more than a year was targeting civil society groups like NGOs and journalist as well as government agencies in a spear-phishing campaign aimed at stealing information. The post DOJ, Microsoft Take Down Domains Used by Russian-Backed Group appeared first on Security Boulevard.

article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Zero Day

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

98
article thumbnail

CISA Warns of Critical Flaws in TEM Opera Plus FM Transmitter Products Used in Critical Infrastructure

Penetration Testing

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding two critical vulnerabilities in the TEM Opera Plus FM Family Transmitter products, widely used in critical infrastructure... The post CISA Warns of Critical Flaws in TEM Opera Plus FM Transmitter Products Used in Critical Infrastructure appeared first on Cybersecurity News.

article thumbnail

The most immersive speaker system I've ever tested is now on sale at Best Buy

Zero Day

The SteelSeries Arena 9 can connect with up to three devices simultaneously, making it an excellent choice for multi-use media spaces. And it's on sale now during Best Buy's competing Prime Day event.

Media 75
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton

Security Boulevard

At Seceon’s 2024 Innovation and Certification Days, one of the standout sessions was a conversation between Tom Ertel, our SVP of Technical Sales at Seceon, Roger Newton Jr., the brain behind the SOC at Logically. Roger shared some real-world insights into how Logically, one of Seceon’s largest partners, battles ransomware and other cyber threats using The post Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton appeared first on Seceon Inc.

article thumbnail

Buy 3 months of Xbox Game Pass Ultimate for 28% off, here's how

Zero Day

Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.

Mobile 75
article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Zero Day

Several new features are coming to Facebook, and they may help you explore your local community more.

94
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

The best resources for CSAM: Resources to send your team this month

Security Boulevard

As Cyber Security Awareness Month (CSAM) kicks off, providing your team with accessible, engaging resources for CSAM is a great way to reinforce cybersecurity best practices. The post The best resources for CSAM: Resources to send your team this month appeared first on Security Boulevard.

article thumbnail

One of the best entry-level portable batteries I've tested is $100 off for October Prime Day

Zero Day

If you're looking for a lightweight, portable battery that'll get you out of a pinch without breaking the bank, check out the EcoFlow River 3, especially at only $159 ahead of October Prime Day.

Banking 74
article thumbnail

USENIX NSDI ’24 – MadEye: Boosting Live Video Analytics Accuracy with Adaptive Camera Configurations

Security Boulevard

Authors/Presenters:Mike Wong, Murali Ramanujam, Guha Balakrishnan, Ravi Netravali Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara ; and via the organizations YouTube channel.

62
article thumbnail

Amazon Prime Day: Best 125+ deals live ahead of October's Big Deal Days sale

Zero Day

October Prime Day may not officially start until next week, but our deal-hunting experts have found the best early Prime Day deals live now on TVs, laptops, phones, and more.

74
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

USENIX NSDI ’24 – Gemino: Practical and Robust Neural Compression for Video Conferencing

Security Boulevard

Authors/Presenters:Vibhaalakshmi Sivaraman, Pantea Karimi, Vedantha Venkatapathy, Mehrdad Khani, Sadjad Fouladi, Mohammad Alizadeh, Frédo Durand, Vivienne Sze Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

62
article thumbnail

Best Prime Day laptop deals to shop in October 2024

Zero Day

We're gearing up for next week's Amazon's October Prime Day, but there are some sweet deals live right now, including a sale on Apple's MacBook Pro, and laptops from Asus, Lenovo, HP and more.

72
article thumbnail

SonarQube 10.7 Release Announcement

Security Boulevard

Sonar introduces powerful AI-driven features, expanded support for new and existing languages and frameworks, and deeper security, all to elevate your code quality. These updates bring significant advancements for developers and teams. The post SonarQube 10.7 Release Announcement appeared first on Security Boulevard.

62
article thumbnail

I tested a 'luxury' nugget ice maker, and it was amazing - and it's on sale for Prime Day

Zero Day

The GE Opal 2.0 is a premium ice maker with all the smarts to make it an exceptionally satisfying kitchen appliance. Get it for 18% off ahead of October Prime Day.

75
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.