Wed.Apr 16, 2025

article thumbnail

CVE Program Almost Unfunded

Schneier on Security

Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled , as the US Department of Homeland Security failed to renew the contact. It was funded for eleven more months at the last minute. This is a big deal. The CVE program is one of those pieces of common infrastructure that everyone benefits from.

CSO 317
article thumbnail

News alert: SquareX to present on uncovering data splicing attacks at BSides San Francisco 2025

The Last Watchdog

Palo Alto, Calif, Apr. 16, 2025, CyberNewswire — SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San Francisco 2025. Titled Data Splicing Attacks: Breaking Enterprise DLP from the Inside Out , the talk will demonstrate multiple data splicing techniques that will allow attackers to exfiltrate any sensitive file or clipboard data, completely bypassing major Data Loss Protection (DLP) vendors listed by Gartner by ex

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA’s 11-Month extension ensures continuity of MITRE’s CVE Program

Security Affairs

MITREs U.S.-funded CVE program, a core cybersecurity tool for tracking vulnerabilities, faces funding expiry Wednesday, risking disruption to global security. U.S. government funding for MITRE s CVE program , a key global cybersecurity resource for cataloging vulnerabilities, is set to expire Wednesday, risking disruption. The 25-year-old program has assigned over 274,000 CVE IDs for public security vulnerabilities.

article thumbnail

Hi, robot: Half of all internet traffic now automated

Malwarebytes

If you sometimes feel that the internet isn’t the same vibrant place it used to be, you’re not alone. New research suggests that most of the traffic traversing the network isn’t human at all. Bots (software programs that interact with web sites) have been ubiquitous for years. But in its 2025 Bad Bot Report , application security company Imperva claimed this is the first time traffic from bots became more prevalent than human traffic.

Internet 144
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps

Security Affairs

Cheap Chinese Android phones ship with trojanized WhatsApp and Telegram clones hiding crypto clippers, active since June 2024. Since June 2024, Doctor Web researchers found cheap Android phones preloaded with fake WhatsApp and Telegram apps designed to steal crypto via clipping. These clippers swap copied wallet addresses with the attackers own. The campaign targeted low-end phones mimicking famous models, using altered system info to trick users.

Malware 128
article thumbnail

“I sent you an email from your email account,” sextortion scam claims

Malwarebytes

In a new version of the old Hello pervert emails, scammers are relying on classic email spoofing techniques to try and convince victims that they have lost control of their email account and computer systems. Email spoofing basically comes down to sending emails with a false sender address, a method in use in various ways by scammers. Obviously, pretending to be someone else can have its advantages, especially if that someone else holds a position of power or trust with regards to the receiver

LifeWorks

More Trending

article thumbnail

Government contractor Conduent disclosed a data breach

Security Affairs

The business services provider Conduent told the SEC a January cyberattack exposed personal data, including names and Social Security numbers. The business services provider Conduent revealed that personal information, including names and Social Security numbers, was stolen in a January cyberattack. In January, Conduent confirmed a cyberattack caused service disruptions after agencies in multiple US states reported outages.

article thumbnail

GPU Hosting, LLMs, and the Unseen Backdoor

SecureWorld News

Big AI runs on big hardware. And right now, that hardware is GPUsrented, stacked, and spinning 24/7 across cloud infrastructure nobody double-checks until something breaks. Everyone's focused on what LLMs say and dobut not where they live or how they're trained. That backend? It's a mess. And it's wide open. This is the blind spot in modern cybersecurity, as not many of us are aware of how important GPUs are for AI.

article thumbnail

MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’

Security Boulevard

These are interesting times: U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16. The post MITRE Crisis: CVE Cash Ends TODAY CISA says No Lapse appeared first on Security Boulevard.

article thumbnail

Funding Crisis Averted: US Extends CVE Program Support Amid Outcry and Rising Concerns

eSecurity Planet

In what felt like a nail-biting moment for the global cybersecurity industry, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced late Tuesday that it has extended funding for MITREs Common Vulnerabilities and Exposures (CVE) program, just hours before the programs contract was set to expire. “The CVE Program is invaluable to the cyber community and a priority of CISA,” the agency said in a statement to BleepingComputer. “Last night, CISA executed the opt

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Streamlining detection engineering in security operation centers

SecureList

Security operations centers (SOCs) exist to protect organizations from cyberthreats by detecting and responding to attacks in real time. They play a crucial role in preventing security breaches by detecting adversary activity at every stage of an attack, working to minimize damage and enabling an effective response. To accomplish this mission, SOC operations can be broken down into four operating phases: Each of these operating phases has a distinct role to play, and well-defined processes or pr

article thumbnail

Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks

Tech Republic Security

Slopsquatting and vibe coding are fueling a new wave of AI-driven cyberattacks, exposing developers to hidden risks through fake, hallucinated packages.

Risk 177
article thumbnail

In a Social Engineering Showdown: AI Takes Red Teams to the Mat 

Security Boulevard

That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing. The post In a Social Engineering Showdown: AI Takes Red Teams to the Mat appeared first on Security Boulevard.

article thumbnail

ISACA impressions: AI, risk and resilience feature at the 2025 conference

BH Consulting

The ISACA Ireland Chapter Conference on 11 April brought together thought leaders in AI, cybersecurity, auditing, governance, and quantum computing. What stood out wasnt just the topics, but how interconnected these seemingly distinct domains are becoming in todays fast-evolving digital landscape. I had the incredible opportunity to attend the event, and heres a reflection on the powerful sessions I attended.

Risk 59
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What’s happening with MITRE and the CVE program uncertainty

Security Boulevard

Yesterday's headlines have sent ripples through the cybersecurity and software supply chain communities: MITRE announced that U.S. government funding for the CVE (Common Vulnerabilities and Exposures) database was set to expire today. Overnight, the CVE Foundation emerged with a plan to maintain the program before the Critical Infrastructure and Security Agency (CISA) announced it has extended support for the program this morning.

article thumbnail

CVE Foundation Launched to Secure Vulnerability Tracking

Penetration Testing

In a major shift for the cybersecurity world, the CVE Foundation has officially been launched to ensure the The post CVE Foundation Launched to Secure Vulnerability Tracking appeared first on Daily CyberSecurity.

article thumbnail

Oracle April 2025 Critical Patch Update Addresses 171 CVEs

Security Boulevard

Oracle addresses 171 CVEs in its second quarterly update of 2025 with 378 patches, including 40 critical updates. Background On April 15, Oracle released its Critical Patch Update (CPU) for April 2025 , the second quarterly update of the year. This CPU contains fixes for 171 unique CVEs in 378 security updates across 32 Oracle product families. Out of the 378 security updates published this quarter, 10.6% of patches were assigned a critical severity.

article thumbnail

Erlang/OTP CVE-2025-32433 (CVSS 10): Critical SSH Flaw Allows Unauthenticated RCE

Penetration Testing

A critical vulnerability has been discovered in the SSH server component of Erlang/OTP, a technology widely used in The post Erlang/OTP CVE-2025-32433 (CVSS 10): Critical SSH Flaw Allows Unauthenticated RCE appeared first on Daily CyberSecurity.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Why the 2025 PyPI Attack Signals a New Era in Cloud Risk

Security Boulevard

The 2025 PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and evolving threats. The post Why the 2025 PyPI Attack Signals a New Era in Cloud Risk appeared first on Security Boulevard.

Risk 59
article thumbnail

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

The Hacker News

Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities. The issues have been uncovered in a binary named "schtasks.

article thumbnail

Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2

Security Boulevard

This is Part 2 of our two-part technical analysis on Mustang Pandas new tools. For details on ToneShell and StarProxy, go to Part 1.IntroductionIn addition to the new ToneShell variants and StarProxy, Zscaler ThreatLabz discovered two new keyloggers used by Mustang Panda that we have named PAKLOG and CorKLOG as well as an EDR evasion driver (SplatCloak) on Mustang Pandas staging server.

article thumbnail

Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins

The Hacker News

Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft login pages.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1

Security Boulevard

IntroductionThe Zscaler ThreatLabz team discovered new activity associated with Mustang Panda, originating from two machines from a targeted organization in Myanmar. This research led to the discovery of new ToneShell variants and several previously undocumented tools. Mustang Panda, a China-sponsored espionage group, traditionally targets government-related entities, military entities, minority groups, and non-governmental organizations (NGOs) primarily in countries located in East Asia, but th

article thumbnail

I found a budget Motorola with a better battery than smartphones twice the price

Zero Day

The Moto G (2025) defies budget phone expectations with its impressive multi-day battery life and a surprisingly capable camera.

121
121
article thumbnail

CVE Program Almost Unfunded

Security Boulevard

Mitres CVEs programwhich provides common naming and other informational resources about cybersecurity vulnerabilitieswas about to be cancelled , as the US Department of Homeland Security failed to renew the contact. It was funded for eleven more months at the last minute. This is a big deal. The CVE program is one of those pieces of common infrastructure that everyone benefits from.

article thumbnail

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

The Hacker News

Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024.

Antivirus 119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How dare you trust the user agent for bot detection?

Security Boulevard

In every HTTP request, the user agent header acts as a self-declared identity card for the clienttypically a browsersharing information about the software and platform supposedly making the request. It usually includes details like the browser name and version, operating system, and rendering engine. But crucially, The post How dare you trust the user agent for bot detection?

article thumbnail

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

The Hacker News

Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security flaws that it said have come under active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2025-31200 (CVSS score: 7.

118
118
article thumbnail

Open Source CIAM: A Practical Guide for the Modern Enterprise

Security Boulevard

Struggling with proprietary identity solutions? This comprehensive guide explores how open source CIAM platforms offer enterprises transparency, flexibility, & cost control while maintaining robust security. Compare leading solutions and discover which best balances security and customer experience. The post Open Source CIAM: A Practical Guide for the Modern Enterprise appeared first on Security Boulevard.

52
article thumbnail

The Need for a Strong CVE Program

Cisco Security

The CVE program is the foundation for standardized vulnerability disclosure and management. With its future uncertain, global organizations face challenges.

114
114
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!