Mon.Feb 10, 2025

article thumbnail

Pairwise Authentication of Humans

Schneier on Security

Here’s an easy system for two humans to remotely authenticate to each other, so they can be sure that neither are digital impersonations. To mitigate that risk, I have developed this simple solution where you can setup a unique time-based one-time passcode (TOTP) between any pair of persons. This is how it works: Two people, Person A and Person B, sit in front of the same computer and open this page; They input their respective names (e.g.

article thumbnail

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

The Last Watchdog

Were just getting started down the road to the Internet of Everything (IoE.) Related: IoT growing at a 24% clip To get there to fully tap the potential of a hyper-interconnected ecosystem where devices, data, AI and humans converge to benefit humankind cybersecurity must first catch up. I had an edifying conversation about this with Steve Hanna , distinguished engineer at Infineon Technologies , a global semiconductor leader in power systems and IoT, based in Neubiberg, Germany.

Internet 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gmail Under Siege: FBI Warns of Unusual AI-Driven Phishing Attacks

eSecurity Planet

In a stark warning to organizations and everyday users alike, cybersecurity experts and government agencies have sounded the alarm over a new breed of Gmail-targeted phishing attacks. With cybercriminals using advanced artificial intelligence algorithms to create more convincing fraudulent messages, the FBIs message is simple and uncompromising: Do not click on anything.

Phishing 115
article thumbnail

XE Group shifts from credit card skimming to exploiting zero-days

Security Affairs

The cybercrime group XE Group exploited a VeraCore zero-day to deploy reverse shells, web shells in recent attacks. A recent investigation by researchers from Intezer and Solis Security shed light on the recent operations of the XE Group. Active since at least 2013 , XE Group is a cybercriminal group focused on credit card skimming and password theft via supply chain attacks. “XE Group transitioned from credit card skimming to targeted information theft, marking a significant shift in thei

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Attackers Use 2.8 Million Devices in Major Brute Force Attack

Security Boulevard

Threat actors are using as many as 2.8 million edge and IoT devices from around the world in a massive brute force attack that is targeting edge security systems from Palo Alto Networks, Ivanti, SonicWall, and other vendors, according to the Shadowserver Foundation. The post Attackers Use 2.8 Million Devices in Major Brute Force Attack appeared first on Security Boulevard.

IoT 87
article thumbnail

4 Most Common Network Attacks and How to Thwart Them

SecureWorld News

Thinking of connectivity as the gravity center of every modern organization's digital ecosystem isn't a far-fetched perspective. It's deeply ingrained into the very fabric of collaboration, cloud computing, data sharing, remote work, and customer engagement. All these crucial areas take a major hit when a network attack happens. And, the unfortunate reality is that no network is immune.

DDOS 68

More Trending

article thumbnail

A suicide reveals the lonely side of AI chatbots, with Courtney Brown (Lock and Code S06E03)

Malwarebytes

Today on the Lock and Code podcast… In February 2024, a 14-year-old boy from Orlando, Florida, committed suicide after confessing his love to the one figure who absorbed nearly all of his timean AI chatbot. For months, Sewell Seltzer III had grown attached to an AI chatbot modeled after the famous Game of Thrones character Daenerys Targaryen. The Daenerys chatbot was not a licensed product, it had no relation to the franchises actors, its writer, or producers, but none of that mattered, as

article thumbnail

Could you Spot a Digital Twin at Work? Get Ready for Hyper-Personalized Attacks

Security Boulevard

The world is worried about deepfakes. Research conducted in the U.S. and Australia finds that nearly three-quarters of respondents feel negatively about them, associating the AI-generated phenomenon with fraud and misinformation. But in the workplace, were more likely to let our guard down. Thats bad news for businesses as the prospect of LLM-trained malicious digital.

article thumbnail

The CISO’s Midset for 2025: Outcomes, Automation, and Leadership

Lenny Zeltser

As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. We increasingly recognize the importance of not just identifying risks but actively addressing them through direct action and influence. To remain relevant, we must continue to stay on top of emerging technologies, such as AI and automation. We must also engage a growing range of stakeholders, from customers to peers and Board members.

CISO 56
article thumbnail

5 Best NIS2 Compliance Software and Solution Providers

Heimadal Security

The European Unions Network and Information Systems Directive 2 (NIS2) is now in effect. And, throughout 2025, governments across the continent will be transposing it into national law. Complying with the regulation involves a combination of changes to workflows, employee behavior, and technology. There isnt a single turnkey solution that will make you compliant on […] The post 5 Best NIS2 Compliance Software and Solution Providers appeared first on Heimdal Security Blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking

WIRED Threat Level

Services supporting victims of online child exploitation and trafficking around the world have faced USAID and State Department cutsand children are suffering as a result, sources tell WIRED.

28
article thumbnail

Australians Hit With One Cyber Attack Every Second in 2024

Tech Republic Security

Australia saw a record surge in cyber attacks in 2024, with data breaches escalating. Experts warn of rising risks as hackers may exploit AI-driven tactics.

article thumbnail

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

The Hacker News

Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200, the vulnerability has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of a cyber physical attack.

135
135
article thumbnail

Cerebras CEO on DeepSeek: Every time computing gets cheaper, the market gets bigger

Zero Day

The economic breakthrough of DeepSeek's techniques will lead not only to an expansion of AI use but a continued arms race to achieve breakthroughs, says CEO Andrew Feldman.

Marketing 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

The Hacker News

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites.

article thumbnail

5 ways AI can help with your taxes - and 10 major mistakes to avoid

Zero Day

AI and taxes: a perfect match or a disaster waiting to happen? Tax preparation is changing fast, but AI still has flaws. Here's where AI tax tools shine, where they fail, and how to use them wisely.

119
119
article thumbnail

8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation

The Hacker News

Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang.

article thumbnail

GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC

Penetration Testing

Security researcher Hakivvi has published an in-depth analysis of CVE-2025-23369 (CVSSv4 7.6), a vulnerability that allows attackers to The post GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed Technical Analysis and Exploit PoC appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

The Hacker News

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware.

Malware 117
article thumbnail

API Gateway Security Needs a Stronger Zero-Trust Strategy

Security Boulevard

Let's discuss the major things anyone should look into before choosing an API gateway in today's sprawling, AI-driven threat landscape. The post API Gateway Security Needs a Stronger Zero-Trust Strategy appeared first on Security Boulevard.

article thumbnail

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

The Hacker News

Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0.

Software 104
article thumbnail

I changed these 8 Apple Watch settings to significantly extend battery life

Zero Day

Your Apple Watch might be losing power quickly in the latest watchOS 11, but some small tweaks can easily fix it.

100
100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

The Hacker News

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucketeach one seems minor until it becomes the entry point for an attack. This week, weve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted.

article thumbnail

How to remotely access and control someone else's iPhone (with their permission)

Zero Day

You can connect to and even control another person's iPhone to provide remote tech support.

89
article thumbnail

The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks

Penetration Testing

Phishing attacks are no longer the domain of elite hackers. With the rise of Phishing-as-a-Service (PhaaS), cybercriminals of The post The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks appeared first on Cybersecurity News.

article thumbnail

Stop buying cheap, no-name SSD drives - here's why

Zero Day

Do yourself a favor and buy something decent.

89
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Protect those you love from internet scams this Valentine’s Day

Webroot

February is a great month to refresh your cyber awareness skills. February 11 marks Safer Internet Day , encouraging us to work together to make the internet a safer and better place. Its the perfect time to learn more about cybersecurity risks and best practices for protecting yourself and your loved ones online. And while February 14 usually means love is in the air, Valentines Day is also a popular day with internet scammers.

Scams 82
article thumbnail

I revisited the iPhone SE in 2025, and it got me excited for everything but itself

Zero Day

Apple is about to replace the now three-year-old iPhone SE, but there will never be another phone quite like it.

87
article thumbnail

Google’s reCAPTCHA Fails to Stop Bots—But It’s Great at Harvesting Your Data

Penetration Testing

Googles reCAPTCHA verification system has drawn widespread criticism from users, who find tasks such as selecting traffic lights, The post Googles reCAPTCHA Fails to Stop BotsBut Its Great at Harvesting Your Data appeared first on Cybersecurity News.

article thumbnail

Buy a OnePlus Open now, get another phone and pair of earbuds for free

Zero Day

A OnePlus Nord N30 and OnePlus Buds Pro 3 are up for grabs on the company's website as part of a Presidents' Day sale.

85
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!