Tue.Nov 19, 2024

article thumbnail

Fintech Giant Finastra Investigating Data Breach

Krebs on Security

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.

article thumbnail

Why Italy Sells So Much Spyware

Schneier on Security

Interesting analysis : Although much attention is given to sophisticated, zero-click spyware developed by companies like Israel’s NSO Group, the Italian spyware marketplace has been able to operate relatively under the radar by specializing in cheaper tools. According to an Italian Ministry of Justice document , as of December 2022 law enforcement in the country could rent spyware for €150 a day, regardless of which vendor they used, and without the large acquisition costs which would normally b

Spyware 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities

The Hacker News

Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.

137
137
article thumbnail

Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany

WIRED Threat Level

More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germany—and the Pentagon is powerless to stop it.

134
134
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-47533 (CVSS 9.8): Cobbler Vulnerability Exposes Linux Servers to Compromise

Penetration Testing

CVE-2024-47533 exposes Cobbler servers to unauthorized access and control, enabling attackers to manipulate system configurations. A critical vulnerability has been discovered in Cobbler, a popular Linux installation server used for... The post CVE-2024-47533 (CVSS 9.8): Cobbler Vulnerability Exposes Linux Servers to Compromise appeared first on Cybersecurity News.

article thumbnail

The 6 Best Free Antivirus Software Providers for Mac in 2024

Tech Republic Security

Security-conscious Mac users may need more protection than their built-in tools provide. Learn about the extra features and functionality offered by the best free antivirus software providers for Mac in 2024.

Antivirus 107

More Trending

article thumbnail

New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems

The Hacker News

Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. "Helldown deploys Windows ransomware derived from the LockBit 3.0 code," Sekoia said in a report shared with The Hacker News.

article thumbnail

Microsoft Ignite 2024 Unveils Groundbreaking AI, Security, and Teams Innovations

Tech Republic Security

Microsoft Ignite 2024 unveils groundbreaking AI, security, and Teams innovations, shaping the future of enterprise tech and digital transformation.

article thumbnail

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

The Hacker News

Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools.

106
106
article thumbnail

ChatGPT vs. ChatGPT Plus: Is a paid subscription still worth it?

Zero Day

OpenAI's GPT-4o model makes it harder to determine who'll find free ChatGPT adequate and when ChatGPT Plus is worth it. We break down your options to help you decide.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

The Hacker News

The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal.

IoT 101
article thumbnail

Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise

Tech Republic Security

Protect your business from VoIP fraud. Learn how to recognize the most common types and harden your phone system security.

Software 115
article thumbnail

Kirk and Spock reunite: AI gives us the Star Trek farewell we always wanted

Zero Day

William Shatner and Leonard Nimoy reunite in a powerful short film using AI and deepfake technology to give fans the emotional farewell they deserve.

article thumbnail

Dell Unveils AI and Cybersecurity Solutions at Microsoft Ignite 2024

Tech Republic Security

Dell announced new AI and cybersecurity advancements at Microsoft Ignite, including APEX File Storage and Copilot services for Azure.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

The Hacker News

A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.

article thumbnail

EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems

Security Boulevard

The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had "critical" or "high-risk" security flaws and another 211 had less dangerous vulnerabilities, risking threats from stolen data to disrupted service. The post EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems appeared first on Security Boulevard.

Risk 99
article thumbnail

Microsoft to tighten Windows security dramatically in 2025 - here's how

Zero Day

Stung by last summer's CrowdStrike meltdown, which crashed Windows PCs and servers worldwide, Microsoft is rolling out a wide range of security changes to Windows.

108
108
article thumbnail

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

The Hacker News

Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild. The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information. "This vulnerability is remotely exploitable without authentication, i.e.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The end of ChromeOS is a new dawn for cheap Android laptops

Zero Day

It's the beginning of the end for ChromeOS as Google faces a pivotal challenge: compete with Apple's Arm dominance while leveraging AI and custom silicon to redefine affordable computing.

132
132
article thumbnail

Embedding Trust as a Strategic Asset in Technical Leadership

SecureWorld News

Discover how technical leaders can transform organizations by embedding trust as a measurable asset within business systems, unlocking sustained value and competitive advantage. Executive summary Organizations must integrate trust value into their core planning, treating it as a strategic asset that can be manufactured, measured, and managed, much like quality in Total Quality Management.

article thumbnail

iPhone 16 Pro vs. iPhone 15 Pro: Consider these 5 reasons before upgrading

Zero Day

If you're on the fence about getting an iPhone 16 Pro, I've broken down the key reasons why you should buy or skip the upgrade, especially if you're on an iPhone 15 Pro.

97
article thumbnail

Analysis & PoC Exploits Released for Palo Alto Zero-Days – CVE-2024-0012 and CVE-2024-9474

Penetration Testing

In a recent analysis, security researcher Sonny from watchTowr unveiled the technical intricacies of two zero-day vulnerabilities affecting Palo Alto Networks’ Next-Generation Firewalls (NGFW). Tracked as CVE-2024-0012 and CVE-2024-9474, these... The post Analysis & PoC Exploits Released for Palo Alto Zero-Days – CVE-2024-0012 and CVE-2024-9474 appeared first on Cybersecurity News.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

My favorite EcoFlow portable battery is only $169 through Black Friday

Zero Day

If you need a lightweight, portable battery that won't break the bank, check out the EcoFlow River 3, especially at only $169, with this early Black Friday deal.

Banking 98
article thumbnail

Free AI editor lures in victims, installs information stealer instead on Windows and Mac

Malwarebytes

A large social media campaign was launched to promote a free Artificial Intelligence (AI) video editor. If the “free” part of that campaign sounds too good to be true, then that’s because it was. Instead of the video editor, users got information stealing malware. Lumma Stealer was installed on Windows machines and Atomic Stealer (AMOS) on Macs.

article thumbnail

Crystal UHD vs QLED: A comparison for buying Samsung TVs this Black Friday

Zero Day

Shopping for a Samsung TV but can't decide between Crystal UHD and QLED? We break down the key reasons to buy one display technology over the other in 2024.

article thumbnail

CISA Warns of Actively Exploited Vulnerabilities in Kemp LoadMaster and Palo Alto Networks PAN-OS

Penetration Testing

Critical flaws in widely-used networking and security products demand immediate attention from administrators. The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three actively exploited vulnerabilities... The post CISA Warns of Actively Exploited Vulnerabilities in Kemp LoadMaster and Palo Alto Networks PAN-OS appeared first on Cybersecurity News.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ignite 2024 introduces new AI agents and more for Microsoft 365 Copilot

Zero Day

Discover how Microsoft Ignite 2024 unveils powerful AI-powered agents and tools in Microsoft 365 Copilot, improving productivity, automation, and collaboration for hybrid work environments.

126
126
article thumbnail

Forums Refresh

Kali Linux

Over the past year we have been hard at work on refreshing the Kali Forums , and today we are proud to announce the official launch. We have taken what we have learnt over the years decades, and created a new home from scratch. At the same time, we are welcoming a new team of community moderators who have been helping us over on Discord. Before you go check it out, lets first take a look at why we are doing this.

Backups 86
article thumbnail

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

The Hacker News

Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of Privileged Access Management (PAM) deployments. Yet, as the threat landscape evolves, so must organizational priorities.

article thumbnail

Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80

Zero Day

Microsoft's project management tools help plan, execute, and complete projects -- and they're on sale for up to 92% off right now.

96
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!