Mon.Dec 30, 2024

article thumbnail

Cisco states that the second data leak is linked to the one from October

Security Affairs

Cisco confirmed the authenticity of the 4GB of leaked data, the data was compromised in a recent security breach, marking the second leak in the incident. Cisco confirmed the authenticity of the 4GB of leaked data, which was compromised in a recent security breach, marking it as the second leak in the incident. “We are aware of some recent social media posts made by the actor.

article thumbnail

Is nowhere safe from AI slop? (Lock and Code S05E27)

Malwarebytes

This week on the Lock and Code podcast… You can see it on X. You can see on Instagram. It’s flooding community pages on Facebook and filling up channels on YouTube. It’s called “AI slop” and it’s the fastest, laziest way to drive engagement. Like “click bait” before it (“You won’t believe what happens next,” reads the trickster headline), AI slop can be understood as the latest online tactic in getting eyeballs, clicks, shares, co

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global

Security Boulevard

Spend more on security! Car and truck dealers fall back on pen and paper as huge SaaS provider gets hacked (again). The post Best of 2024: 30,000 Dealerships Down Ransomware Outage Outrage no. 2 at CDK Global appeared first on Security Boulevard.

article thumbnail

Critical Actions Post Data Breach

SecureWorld News

Recent cybersecurity statistics indicate that data breaches are escalating into a significant international concern. This underscores the need not only for strong preventive measures to protect critical information but also for a well-defined strategy to contain the damage if attackers successfully breach your defenses. A robust incident response plan is crucial for mitigating the fallout from a data breach.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Salt Typhoon’s Reach Continues to Grow

Schneier on Security

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

article thumbnail

Windows 11 Media Update Bug Stops Security Updates

Tech Republic Security

Microsoft advises users not to install recent security updates using physical media. The company is working on a fix.

Media 176

LifeWorks

More Trending

article thumbnail

VyprVPN Review (2025): Can It Still Perform This Year and Beyond?

Tech Republic Security

VyprVPN is known for strong performance with top-notch security and speed. Discover if it remains a reliable choice for privacy and streaming this year and beyond.

VPN 154
article thumbnail

AI agents might be the new workforce, but they still need a manager

Zero Day

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

140
140
article thumbnail

Cybersecurity Resolutions for 2025: Prepare Your Business for What’s Ahead

Security Boulevard

Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead As we approach the new year, its time to reflect on the cybersecurity challenges of 2024 and prepare for what lies ahead. The digital landscape continues to evolve, with cyber threats becoming more sophisticated and [] The post Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead appeared first on Cyber security services provider

article thumbnail

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

The Hacker News

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment.

Malware 134
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Zero Day

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

130
130
article thumbnail

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The Hacker News

The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks.

Insurance 132
article thumbnail

How MXDR Services Solve Cyber Talent Shortages

Heimadal Security

The cybersecurity industry faces an unprecedented talent shortage. In this article, we’ll explore the implications of this shortage and how MXDR services can bridge the gap. The shortage in cybersecurity expertise presents a significant challenge, affecting various sectors, from businesses to national security. Some notable instances include: Supply Chains: The June 2023 MOVEit Transfer breach […] The post How MXDR Services Solve Cyber Talent Shortages appeared first on Heimdal Secur

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Zero Day

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

122
122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15!

Penetration Testing

The LineageOS team has smashed expectations with a lightning-fast release of LineageOS 22.1, based on Android 15 QPR1. Thanks to a surge in passionate contributors and new project leaders, the... The post LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15! appeared first on Cybersecurity News.

article thumbnail

How to add alt text to images on Bluesky (and why you should)

Zero Day

Alt text is far more important than you might think, and Bluesky makes it fairly easy for you to add it to images you post.

122
122
article thumbnail

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

The Hacker News

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials.

116
116
article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Zero Day

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

119
119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns

Penetration Testing

Security researchers NSG650 and Pdawg have unveiled a proof-of-concept UEFI bootkit that exploits a critical firmware function to compromise the Windows kernel during the boot process. This bootkit demonstrates the... The post Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns appeared first on Cybersecurity News.

article thumbnail

New Windows 11 24H2 bug could block future security updates - see who's affected

Zero Day

Installing the Windows 11 2024 version via a CD or flash drive may cause it to reject any future updates.

108
108
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

Hacking 91
article thumbnail

5 alternative browsers that might just replace Safari on your Mac

Zero Day

Although Safari is a competent browser, there are better alternatives available. Let's look at five hidden gems I've tried and recommend -- but you might not have heard about them until now.

105
105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

The Hacker News

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization.

article thumbnail

This low-cost Lenovo gaming PC is the one I recommend to most people. Let me tell you why

Zero Day

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of easily handling most workloads. And the best part is that it's inexpensive.

98
article thumbnail

Treasury Department Hit by Major Cybersecurity Incident, China Suspected

Penetration Testing

The U.S. Department of the Treasury has disclosed a major cybersecurity incident, potentially compromising sensitive government information. In a letter to the Senate Committee on Banking, Housing, and Urban Affairs,... The post Treasury Department Hit by Major Cybersecurity Incident, China Suspected appeared first on Cybersecurity News.

article thumbnail

These are the top wearable tech products of 2024

Zero Day

From sleep earbuds to smart rings, here are the wearables that impressed me most this year.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

LLMs Crack the Code: 95% Success Rate in Hacking Challenge

Penetration Testing

A recent study demonstrates the transformative potential of large language models (LLMs) in offensive cybersecurity tasks. Researchers Rustem Turtayev, Artem Petrov, Dmitrii Volkov, and Denis Volk have achieved a record-breaking... The post LLMs Crack the Code: 95% Success Rate in Hacking Challenge appeared first on Cybersecurity News.

Hacking 78
article thumbnail

I still recommend this TCL TV model from last year - especially at up to $700 off right now

Zero Day

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. Right now, three of the models have received huge discounts.

98
article thumbnail

66,000 DrayTek Gateways Vulnerable to Remote Command Injection (CVE-2024-12987), PoC Published

Penetration Testing

Security researcher Netsecfish has discovered a command injection vulnerability, tracked as CVE-2024-12987, in the web management interface of popular DrayTek gateway devices. This flaw could enable attackers to execute arbitrary... The post 66,000 DrayTek Gateways Vulnerable to Remote Command Injection (CVE-2024-12987), PoC Published appeared first on Cybersecurity News.

article thumbnail

Google's quantum breakthrough is 'truly remarkable' - but there's more to do

Zero Day

Scaling physical qubits reliably is a step forward. Now comes the hard part: actual circuits.

97
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!