Fri.Oct 04, 2024

article thumbnail

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Tech Republic Security

Check Point documented 5,000 spam emails coming from legitimate-looking domains as fake Microsoft application alerts. Real links complete the trap.

Phishing 205
article thumbnail

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

The Hacker News

Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads.

Passwords 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Setting Up Your Network Security? Avoid These 4 Mistakes

Tech Republic Security

Learn how to execute the fundamentals, harden your defenses, and protect your business's network security with no high-tech software.

article thumbnail

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

The Hacker News

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds.

DDOS 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Tech Republic Security

Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them.

Software 172
article thumbnail

Scam Information and Event Management

SecureList

While trying to deliver malware on victims’ devices and stay on them as long as they can, sometimes attackers are using quite unusual techniques. In a recent campaign starting in 2022, unknown malicious actors have been trying to mine cryptocurrency on victims’ devices without user consent; they’ve used large amounts of resources for distribution, but what’s more, used multiple unusual vectors for defense evasion and persistence.

Scams 141

More Trending

article thumbnail

U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown

The Hacker News

Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country.

article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software.

Malware 140
article thumbnail

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

The Hacker News

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and including 6.5.0.2.

136
136
article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

Passwords 138
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

This Video Game Controller Has Become the US Military’s Weapon of Choice

WIRED Threat Level

After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.

135
135
article thumbnail

How to Get Going with CTEM When You Don't Know Where to Start

The Hacker News

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization.

article thumbnail

Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam

Security Boulevard

In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was then stolen, according to a report from Group-IB. The post Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam appeared first on Security Boulevard.

Scams 119
article thumbnail

Sellafield nuclear site hit with £332,500 fine after “significant cybersecurity shortfalls”

Graham Cluley

The UK's Sellafield nuclear waste processing and storage site has been fined £332,500 by regulators after its IT systems were found to have been left vulnerable to hackers and unauthorised access for years. Read more in my article on the Hot for Security blog.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

DOJ, Microsoft Take Down Domains Used by Russian-Backed Group

Security Boulevard

The DOJ and Microsoft in a joint effort seized dozens of domains from a Russian-based threat group known as Star Blizzard, which for more than a year was targeting civil society groups like NGOs and journalist as well as government agencies in a spear-phishing campaign aimed at stealing information. The post DOJ, Microsoft Take Down Domains Used by Russian-Backed Group appeared first on Security Boulevard.

Phishing 119
article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Zero Day

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

article thumbnail

Why are we still talking about cybersecurity basics after all these years?

Security Boulevard

Cybersecurity basics remain crucial even after decades. Despite technological advances, simple practices like using strong passwords, enabling MFA, and staying alert to phishing are often overlooked due to our fast-paced lives. Slowing down to implement these measures prevents costly breaches and enhances overall security. The post Why are we still talking about cybersecurity basics after all these years?

article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Zero Day

Several new features are coming to Facebook, and they may help you explore your local community more.

97
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

New CUPS Vulnerability Can Amplify DDoS Attacks: Patch Now!

Heimadal Security

A newly discovered vulnerability in the open-source CUPS (Common Unix Printing System) printing system can be used by threat actors to launch DDoS attacks with a 600x amplification factor. Known as CVE-2024-47176, the security flaw in the cups-browsed daemon can be chained to three other bugs to allow threat actors to gain remote code execution […] The post New CUPS Vulnerability Can Amplify DDoS Attacks: Patch Now!

DDOS 83
article thumbnail

YouTube Shorts are changing in 5 unique ways, and I love the new creative freedom

Zero Day

YouTube is expanding the runtimes of its short-form content and giving users an easy way to remix their favorite clips.

96
article thumbnail

Open-Source Security Through the Lens of Tidelift

Cisco Security

Cisco is excited to build on our existing relationship with Tidelift by making Tidelift's capabilities available to internal developers across Cisco. Cisco is excited to build on our existing relationship with Tidelift by making Tidelift's capabilities available to internal developers across Cisco.

80
article thumbnail

8 Tips to protect your devices from malware attacks

Webroot

Unfortunately, when your devices are infected with a virus, it’s not as easy as a little bed rest for them to recover, and the damage can be long-lasting. A cyberattack can compromise your computers, phones and tablets, and open the door for cyber thieves to steal your sensitive personal information. According to a study by the University of Maryland’s A.

Malware 80
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The complexities of attack attribution – Week in security with Tony Anscombe

We Live Security

Attributing a cyberattack to a specific threat actor is no easy task, as highlighted by new ESET research published this week.

77
article thumbnail

Buy a Microsoft Office license for Mac or Windows for $25 right now

Zero Day

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

76
article thumbnail

CISA Warns of Critical Flaws in TEM Opera Plus FM Transmitter Products Used in Critical Infrastructure

Penetration Testing

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding two critical vulnerabilities in the TEM Opera Plus FM Family Transmitter products, widely used in critical infrastructure... The post CISA Warns of Critical Flaws in TEM Opera Plus FM Transmitter Products Used in Critical Infrastructure appeared first on Cybersecurity News.

article thumbnail

Best Prime Day impulse buys to shop in October 2024

Zero Day

The October Prime Day sale is coming. Discover the quirky side of Amazon deals for spontaneous joy and creative vibes.

76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton

Security Boulevard

At Seceon’s 2024 Innovation and Certification Days, one of the standout sessions was a conversation between Tom Ertel, our SVP of Technical Sales at Seceon, Roger Newton Jr., the brain behind the SOC at Logically. Roger shared some real-world insights into how Logically, one of Seceon’s largest partners, battles ransomware and other cyber threats using The post Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton appeared first on Seceon Inc.

article thumbnail

These discounted Meta Ray-Ban smart glasses are my favorite Prime Day deal so far

Zero Day

They may be refurbished, but ongoing feature updates and any form of discount make the Ray-Ban smart glasses worthy of your consideration.

75
article thumbnail

Escape vs Invicti

Security Boulevard

Discover why Escape is a better API security solution. The post Escape vs Invicti appeared first on Security Boulevard.

64
article thumbnail

World Wide Web Foundation to close, as Berners-Lee shifts focus to Solid Protocol

Zero Day

The web's founder isn't stopping advocating for a safer, better web. He's just redirecting his energy.

76
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.