Wed.Jan 22, 2025

article thumbnail

MasterCard DNS Error Went Unnoticed for Years

Krebs on Security

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for nearly five years until a security researcher spent $300 to register the domain and prevent it from being grabbed by cybercriminals.

DNS 361
article thumbnail

You Can't Trust Hackers, and Other Data Breach Verification Tales

Troy Hunt

It's hard to find a good criminal these days. I mean a really trustworthy one you can be confident won't lead you up the garden path with false promises of data breaches. Like this guy yesterday: For my international friends, JB Hi-Fi is a massive electronics retailer down under and they have my data! I mean by design because I've bought a bunch of stuff from them, so I was curious not just about my own data but because a breach of 12 million plus people would be massive in a coun

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7-Zip bug could allow a bypass of a Windows security feature. Update now

Malwarebytes

A patch is available for a vulnerability in 7-Zip that could have allowed attackers to bypass the Mark-of-the-Web (MotW) security feature in Windows. The MotW is an attribute added to files by Windows when they have been sourced from an untrusted location, like the internet or a restricted zone. The MotW is what triggers warnings that opening or running such files could lead to potentially dangerous behavior, including installing malware on their devices. 7-Zip added support for MotW in June 202

Internet 142
article thumbnail

A 7-Zip bug allows to bypass the Mark of the Web (MotW) feature

Security Affairs

A vulnerability in the 7-Zip file software allows attackers to bypass the Mark of the Web (MotW) Windows security feature. Attackers can exploit a vulnerability, tracked as CVE-2025-0411 , in the free, open-source file archiver software 7-Zip to bypass the Mark of the Web (MotW) Windows security feature. Mark of the Web (MotW) is a security feature in Microsoft Windows that identifies files downloaded from untrusted sources, such as the internet.

Software 125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Future-Proof Your WordPress Site: Essential Plugins for 2025

IT Security Guru

The digital landscape is constantly growing and evolving. As such, some tips and tricks that worked for websites in 2023 might be obsolete in 2025. For any digital professional, remaining dedicated to top-quality practice that stands the test of time is just the start. This means staying ahead of the curve and leveraging the best tools available. When it comes to WordPress, that often means choosing the right plugins at the right time.

article thumbnail

AI-Powered Phishing: Defending Against New Browser-Based Attacks

SecureWorld News

The cybersecurity landscape has witnessed a dramatic shift with the rise of AI-powered phishing attacks. These sophisticated threats are pushing organizations to reevaluate their defense strategies, particularly in the realm of browser security. The evolution of AI-enhanced phishing Today's phishing attempts are far more sophisticated than ever before.

Phishing 107

LifeWorks

More Trending

article thumbnail

Developing Security Protocols for Agentic AI Applications 

Security Boulevard

Agentic AI can be an incredibly powerful asset like another member of the team. However, it can quickly become a liability due to poorly designed frameworks or lax security protocols. The post Developing Security Protocols for Agentic AI Applications appeared first on Security Boulevard.

article thumbnail

Cloudflare blocked a record-breaking 5.6 Tbps DDoS attack

Security Affairs

Cloudflare announced that it has blocked a record-breaking 5.6 terabit-per-second (Tbps) distributed denial-of-service (DDoS) attack. Cloudflare announced that during the week of Halloween 2024, it autonomously detected and blocked a 5.6 Terabit per second (Tbps) DDoS attack, which is the largest attack ever reported. The previous largest DDoS attack blocked by Cloudflare occurred in October 2024 and peaked at 3.8 Tbps.

DDOS 69
article thumbnail

Authentication and Single Sign-On: Essential Technical Foundations

Security Boulevard

Dive deep into the technical fundamentals of Authentication and SSO systems. Learn how HTTP, security protocols, and best practices work together to create robust authentication solutions for modern web applications. The post Authentication and Single Sign-On: Essential Technical Foundations appeared first on Security Boulevard.

article thumbnail

Report Finds 50% of Scattered Spider Phishing Domains Targeted Finance & Insurance

Digital Shadows

Were thrilled to unveil our latest threat landscape report for the finance and insurance sector, offering in-depth analysis of the evolving cyber threats facing this industry. In this blog, well preview the reports highlights and give insights into social engineering campaigns leveraging impersonating domains and our predictions for the threats shaping 2025.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA

Thales Cloud Protection & Licensing

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA madhav Thu, 01/23/2025 - 06:25 Data Breaches in Healthcare: Why Stronger Regulations Matter A data breach involving personal health information isnt just about stolen filesits a gut punch to trust and a serious shake-up to peoples lives. Think about it: sharing your deepest, most personal health concerns, only to have them spilled out into the world because of a cyberattack.

article thumbnail

Pwn2Own Automotive 2025 Day 1: organizers awarded $382,750 for 16 zero-days

Security Affairs

Trend Micros Zero Day Initiative (ZDI) announced that $380K was awarded on Day 1 of Pwn2Own Automotive 2025. Trend Micros Zero Day Initiative (ZDI) announced that over $380,000 was awarded on Day 1 of Pwn2Own Automotive 2025, a hacking contest that was held in Tokyo. In total, the organizers awarded $382,750 for 16 unique working zero-day exploits targeting infotainment systems, electric vehicle (EV) chargers, and automotive operating systems.The team fuzzware.io (composed of Tobias Scharnowski

Hacking 64
article thumbnail

How to Create a Secure Username

Tech Republic Security

Discover how to create a unique and secure username for your online accounts, and find out why its just as important as having a strong password.

Passwords 165
article thumbnail

Google Cloud Security Threat Horizons Report #11 Is Out!

Security Boulevard

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 , #5 , #6 , #7 , #8 , #9 and #10 ). My favorite quotes from the report followbelow: Nearly half (46.4%) of the observed security alerts were due to overprivileged service accounts.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to Turn Off Read Receipts on WhatsApp Group Chat

Hacker's King

WhatsApp has become an integral communication tool for millions worldwide. One of its prominent features is the read receipt, commonly known as the blue tick. This feature informs senders when their messages have been read. While convenient, there are times when you might want to maintain your privacy and disable the blue ticksespecially in group chats.

article thumbnail

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet

The Hacker News

Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks. According to QiAnXin XLab, the attacks have leveraged the security flaw since June 2024. Additional details about the shortcomings have been withheld to prevent further abuse.

DDOS 134
article thumbnail

How To Recover Instagram Hacked Account Complete Guide

Hacker's King

Instagram has become essential to our lives, allowing us to share memories, connect with others, and promote businesses. However, its popularity makes it a prime target for hackers. If your Instagram account has been compromised, don't panic. Here is a comprehensive, step-by-step guide to help you recover and secure your hacked Instagram account against future attacks.

article thumbnail

Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

The Hacker News

Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit a remote, authenticated attacker to gain administrator privileges on susceptible instances. The vulnerability, tracked as CVE-2025-20156, carries a CVSS score of 9.9 out 10.0. It has been described as a privilege escalation flaw in the REST API of Cisco Meeting Management.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Cloud Security Threat Horizons Report #11 Is Out!

Anton on Security

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 , #5 , #6 , #7 , #8 , #9 and #10 ). My favorite quotes from the report followbelow: Nearly half (46.4%) of the observed security alerts were due to overprivileged service accounts.

Passwords 130
article thumbnail

CVE-2025-23006 (CVSS 9.8): SonicWall Warns of Active Exploits, Issues Urgent Update for SMA1000 Users

Penetration Testing

SonicWall has issued an urgent security advisory warning of a critical vulnerability in its SMA1000 Appliance Management Console The post CVE-2025-23006 (CVSS 9.8): SonicWall Warns of Active Exploits, Issues Urgent Update for SMA1000 Users appeared first on Cybersecurity News.

article thumbnail

A Record-Breaking Year for CVEs and How Veriti Helped Customers Be Proactive

Security Boulevard

2024 was a watershed moment in cybersecurity, marked by a staggering surge in CVEs. A record-breaking 40,009 CVEs were published, representing a 38.8% increase over the previous year. This explosive growth in disclosed vulnerabilities brought both challenges and opportunities for organizations aiming to stay ahead of the curve with preemptive cybersecurity.

article thumbnail

Samsung Galaxy S25 Ultra vs iPhone 16 Pro Max: Which phone should you buy?

Zero Day

Samsung and Apple have introduced two of the best flagship smartphones on the market. Here's how to choose which one is right for you.

Marketing 124
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack

The Hacker News

A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET.

VPN 119
article thumbnail

Have a genealogy mystery? How I used AI to solve a family puzzle

Zero Day

I met my third cousin on Ancestry. Even though we share just 1% of our DNA, we used ChatGPT to connect the dots between generations.

article thumbnail

TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

The Hacker News

Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and on-premise ransomware attacks.

article thumbnail

Simplifying Zero Trust Security for the Modern Workplace

Cisco Security

Ciscos User Protection Suite now includes Identity Services Engine (ISE), enabling organizations to achieve zero trust for the workplace.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

This E reader tablet made me put down my Kindle and iPad within hours of using it

Zero Day

I've been a Kindle user for years, but the TCL Tab 10 Nxtpaper 5G has become my favorite e-reader tablet for several reasons.

116
116
article thumbnail

Unlock Your Cybersecurity Potential: SecureWorld PLUS Training Courses

SecureWorld News

Are you ready to deepen your cybersecurity knowledge and take your skills to the next level? SecureWorld PLUS courses are back for Spring 2025, offering an incredible opportunity for hands-on, expert-led training at all eight of our regional conferences. Whether you're a seasoned security professional or just starting your journey, these in-depth courses are designed to equip you with actionable insights and training that boost your career.

article thumbnail

Is classic Outlook crashing when you start or reply to an email? A fix is on the way

Zero Day

A fix is due out in late January. For now, Microsoft has a workaround.

116
116
article thumbnail

Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks

The Hacker News

As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have skyrocketed. Forward-thinking security teams are looking for security controls and strategies to address these risks, but they do not always know which risks to prioritize.

Risk 98
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!