Mon.Dec 30, 2024

article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

Windows 11 Media Update Bug Stops Security Updates

Tech Republic Security

Microsoft advises users not to install recent security updates using physical media. The company is working on a fix.

Media 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: SquareX exposes OAuth attack on Chrome extensions — days before a major breach

The Last Watchdog

Palo Alto, Calif., Dec. 30, 2024, CyberNewswire — SquareX , an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension developers aimed at taking over the Chrome Extension from the Chrome Store. On December 25th, 2024, a malicious version of Cyberhavens browser extension was published on the Chrome Store that allowed the attacker to hijack authenticated sessions and ex

Phishing 130
article thumbnail

VyprVPN Review (2025): Can It Still Perform This Year and Beyond?

Tech Republic Security

VyprVPN is known for strong performance with top-notch security and speed. Discover if it remains a reliable choice for privacy and streaming this year and beyond.

VPN 140
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cisco states that the second data leak is linked to the one from October

Security Affairs

Cisco confirmed the authenticity of the 4GB of leaked data, the data was compromised in a recent security breach, marking the second leak in the incident. Cisco confirmed the authenticity of the 4GB of leaked data, which was compromised in a recent security breach, marking it as the second leak in the incident. “We are aware of some recent social media posts made by the actor.

article thumbnail

AI agents might be the new workforce, but they still need a manager

Zero Day

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

132
132

More Trending

article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Zero Day

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

127
127
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

Hacking 120
article thumbnail

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

The Hacker News

The United States Treasury Department said it suffered a "major cybersecurity incident" that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents.

Software 117
article thumbnail

Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global

Security Boulevard

Spend more on security! Car and truck dealers fall back on pen and paper as huge SaaS provider gets hacked (again). The post Best of 2024: 30,000 Dealerships Down Ransomware Outage Outrage no. 2 at CDK Global appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Zero Day

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

114
114
article thumbnail

LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15!

Penetration Testing

The LineageOS team has smashed expectations with a lightning-fast release of LineageOS 22.1, based on Android 15 QPR1. Thanks to a surge in passionate contributors and new project leaders, the... The post LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15! appeared first on Cybersecurity News.

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Zero Day

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

109
109
article thumbnail

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The Hacker News

The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks.

Insurance 104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

New Windows 11 24H2 bug could block future security updates - see who's affected

Zero Day

Installing the Windows 11 2024 version via a CD or flash drive may cause it to reject any future updates.

106
106
article thumbnail

Is nowhere safe from AI slop? (Lock and Code S05E27)

Malwarebytes

This week on the Lock and Code podcast… You can see it on X. You can see on Instagram. It’s flooding community pages on Facebook and filling up channels on YouTube. It’s called “AI slop” and it’s the fastest, laziest way to drive engagement. Like “click bait” before it (“You won’t believe what happens next,” reads the trickster headline), AI slop can be understood as the latest online tactic in getting eyeballs, clicks, shares, co

article thumbnail

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

The Hacker News

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment.

Malware 102
article thumbnail

How to add alt text to images on Bluesky (and why you should)

Zero Day

Alt text is far more important than you might think, and Bluesky makes it fairly easy for you to add it to images you post.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Critical Actions Post Data Breach

SecureWorld News

Recent cybersecurity statistics indicate that data breaches are escalating into a significant international concern. This underscores the need not only for strong preventive measures to protect critical information but also for a well-defined strategy to contain the damage if attackers successfully breach your defenses. A robust incident response plan is crucial for mitigating the fallout from a data breach.

article thumbnail

Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns

Penetration Testing

Security researchers NSG650 and Pdawg have unveiled a proof-of-concept UEFI bootkit that exploits a critical firmware function to compromise the Windows kernel during the boot process. This bootkit demonstrates the... The post Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns appeared first on Cybersecurity News.

article thumbnail

5 alternative browsers that might just replace Safari on your Mac

Zero Day

Although Safari is a competent browser, there are better alternatives available. Let's look at five hidden gems I've tried and recommend -- but you might not have heard about them until now.

88
article thumbnail

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

The Hacker News

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials.

86
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

This low-cost Lenovo gaming PC is the one I recommend to most people. Let me tell you why

Zero Day

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of easily handling most workloads. And the best part is that it's inexpensive.

84
article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

In December 2023, as cyberattacks surged, the U.S. Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. This pushed C-level executives and boards to adopt measures for compliance and transparency. In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance.

article thumbnail

Google's quantum breakthrough is 'truly remarkable' - but there's more to do

Zero Day

Scaling physical qubits reliably is a step forward. Now comes the hard part: actual circuits.

79
article thumbnail

Treasury Department Hit by Major Cybersecurity Incident, China Suspected

Penetration Testing

The U.S. Department of the Treasury has disclosed a major cybersecurity incident, potentially compromising sensitive government information. In a letter to the Senate Committee on Banking, Housing, and Urban Affairs,... The post Treasury Department Hit by Major Cybersecurity Incident, China Suspected appeared first on Cybersecurity News.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The next big HDMI leap is coming next week - what the 2.2 standard means for you

Zero Day

Voluminous bandwidth, buttery-smooth refresh rates, and pricier cables are on deck for the New Year.

75
article thumbnail

IPMsg Installer Weaponized: Lazarus Group Targets Crypto & Finance

Penetration Testing

The notorious APT-C-26 (Lazarus) group, known for its advanced persistence and cyber espionage tactics, has resurfaced with a new campaign targeting financial institutions and cryptocurrency exchanges. In a recent analysis... The post IPMsg Installer Weaponized: Lazarus Group Targets Crypto & Finance appeared first on Cybersecurity News.

article thumbnail

I still recommend this TCL TV model from last year - especially at up to $700 off right now

Zero Day

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. Right now, three of the models have received huge discounts.

73
article thumbnail

LLMs Crack the Code: 95% Success Rate in Hacking Challenge

Penetration Testing

A recent study demonstrates the transformative potential of large language models (LLMs) in offensive cybersecurity tasks. Researchers Rustem Turtayev, Artem Petrov, Dmitrii Volkov, and Denis Volk have achieved a record-breaking... The post LLMs Crack the Code: 95% Success Rate in Hacking Challenge appeared first on Cybersecurity News.

Hacking 68
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.