Wed.Dec 18, 2024

article thumbnail

How to Lose a Fortune with Just One Bad Click

Krebs on Security

Image: Shutterstock, iHaMoo. Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from google.com, and ultimately seized control over the account by convincing him to click “yes” to a Google prompt on his mobile device.

article thumbnail

New Advances in the Understanding of Prime Numbers

Schneier on Security

Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based public-key algorithms, but every little bit matters.

193
193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. Part four of our four-part series From cybersecurity skills shortages to the pressures of hybrid work, the challenges facing organizations are at an all-time high. Experts here explore the importance of fostering a resilient workforce, backed by AI-enhanced training and layered security strategies.

Risk 130
article thumbnail

The open-source tools that could disrupt the entire IT incident management market

Zero Day

Open-source tools like Grafana Labs and AI-driven AIOps are shaking up incident management, challenging PagerDuty and streamlining IT problem-solving and code fixes. Here's why it matters.

Marketing 102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

The Last Watchdog

Today, part three of Last Watchdog s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, with new standards in encryption and software transparency raising the bar. From the push for quantum-resilient cryptography to Software Bill of Material (SBOM ) requirements aimed at bolstering supply chain security, this installment examines the regulatory

article thumbnail

Ground Rule of Cyber Hygiene: Keep Your Password Policy Up to Date

Security Boulevard

Since the earliest incidents of computer break-ins, experts have maintained that making the internet a safe place is going to be an uphill battle. Their reasons, while largely technical, also encompass human complacency. Research shows that most organizations and users fail to follow the simple practices that make computing safe. In 2024, organizations reported a.

More Trending

article thumbnail

Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions

Security Boulevard

Arctic Wolf this week revealed it has acquired the Cyclance endpoint security platform from Blackberry for $160 million. The post Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions appeared first on Security Boulevard.

article thumbnail

Using Windows 11? Change these 4 settings to keep your PC running smoothly

Zero Day

If you're having trouble with Windows 11, consult this short list of the four best things you can do to enhance your PC's performance.

98
article thumbnail

INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse

The Hacker News

INTERPOL is calling for a linguistic shift that aims to put to an end to the term "pig butchering," instead advocating for the use of "romance baiting" to refer to online scams where victims are duped into investing in bogus cryptocurrency schemes under the pretext of a romantic relationship.

Scams 94
article thumbnail

The 4 easiest ways to test Linux on your old PC before Windows 10 support runs out

Zero Day

If you're considering a migration from the soon sunsetting Windows 10 to Linux and you're looking for a way to test the open-source operating system, here are four options.

98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft

The Hacker News

Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim to harvest account credentials and take control of the victims' Microsoft Azure cloud infrastructure. The campaign has been codenamed HubPhish by Palo Alto Networks Unit 42 owing to the abuse of HubSpot tools in the attack chain.

article thumbnail

This hidden Apple feature turns your iPhone or iPad into an AI image generator

Zero Day

With Image Playground, you can generate images based on themes and other concepts, your own descriptions, and photos from your device's library.

90
article thumbnail

ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation

The Hacker News

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, its vital to understand the current cybersecurity vendor landscape and continually assess the effectiveness of available solutions.

article thumbnail

4 Ways To Unleash Speed and Efficiency in the SOC

Security Boulevard

With the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. The post 4 Ways To Unleash Speed and Efficiency in the SOC appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

The Hacker News

The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.

article thumbnail

The top mobile AI features that Apple and Samsung owners actually use

Zero Day

And why some users are avoiding the latest AI features on their phones.

Mobile 85
article thumbnail

Understanding Virtual Skimmers: A Threat to E-Commerce Security 

Security Boulevard

Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until its too late. The post Understanding Virtual Skimmers: A Threat to E-Commerce Security appeared first on Security Boulevard.

article thumbnail

What WordPress users need to know about the Automattic and WP Engine conflict

Zero Day

Automattic, the company behind WordPress, is fighting with WP Engine, one of the leading WordPress hosting companies. This situation could spell trouble for WordPress users.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The Mask APT is back after 10 years of silence

Security Affairs

Kaspersky researchers linked a new wave of cyber attacks to the cyber espionage group tracked as The Mask. Kaspersky researchers linked several targeted attacks to a cyber espionage group known as The Mask. The APT group targeted an organization in Latin America in 2019 and 2022. Threat actors accessed an MDaemon email server and used its WorldClient webmail component to maintain persistence within the compromised organization. “The persistence method used by the threat actor was based on

article thumbnail

US may ban world's most popular routers and modems - what that means for you

Zero Day

TP-Link products have been connected to several high-profile hacking incidents. (Also, they're made in China.

Hacking 81
article thumbnail

5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year

Security Boulevard

A CLM policy also puts you in the best position to mitigate and prevent cyberthreats, including man-in-the-middle attacks and phishing scams. The post 5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year appeared first on Security Boulevard.

Scams 85
article thumbnail

Russia-linked APT29 group used red team tools in rogue RDP attacks

Security Affairs

Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October 2024, the Russia-linked cyber espionage group APT29 (aka Earth Koshchei, SVR group , Cozy Bear , Nobelium , BlueBravo , Midnight Blizzard , and The Dukes ) used rogue RDP attacks via phishing emails targeting governments, think tanks, and Ukrainian entities to steal data and install malware.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Acumen Threat Analysis: Preparing for 2025 

Security Boulevard

Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned about the risks posed by insiders. The post Acumen Threat Analysis: Preparing for 2025 appeared first on Security Boulevard.

article thumbnail

Ham radio is still a disaster lifeline, even in the iPhone era - here's why

Zero Day

Sometimes disaster strikes and conventional communication systems fail. Here's how amateur ham radio operators provide a crucial link between those in affected areas and the outside world.

75
article thumbnail

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products

The Hacker News

BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and Remote Support (RS) products that could potentially lead to the execution of arbitrary commands. Privileged Remote Access controls, manages, and audits privileged accounts and credentials, offering zero trust access to on-premises and cloud resources by internal, external, and third-party users.

article thumbnail

6 Linux myths, busted

Zero Day

Linux is more popular than ever, but certain myths still surround the open-source OS. Let's clear some things up.

75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Irish Data Protection Commission (DPC) fined Meta €251 million for a 2018 data breach

Security Affairs

Meta has been fined 251M ($263M) for a 2018 data breach affecting millions in the EU, marking another penalty for violating privacy laws. The Irish Data Protection Commission (DPC) fined Meta 251 million ($263M) for a 2018 data breach impacting 29 million Facebook accounts. “The Irish Data Protection Commission (DPC) has today announced its final decisions following two inquiries into Meta Platforms Ireland Limited (MPIL).

article thumbnail

AI software startups set to take over $12 trillion US services industry

Zero Day

Areas resistant to automation - like legal services and healthcare - are attracting novel applications that could even displace human workers, according to a Bank of America report.

article thumbnail

CVE-2024-12356 (CVSS 9.8): Critical Vulnerability in BeyondTrust PRA and RS Enables Remote Code Execution

Penetration Testing

A critical command injection vulnerability (CVE-2024-12356) has been discovered in BeyondTrusts Privileged Remote Access (PRA) and Remote Support (RS) solutions. With a CVSS score of 9.8, this flaw represents a... The post CVE-2024-12356 (CVSS 9.8): Critical Vulnerability in BeyondTrust PRA and RS Enables Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

This $1 phone scanner app can detect Pegasus spyware. Here's how

Zero Day

Pegasus spyware has been infamous for infecting the phones of journalists, activists, human rights organizations, and dissidents globally. iVerifyBasic helped me scan my phone for spyware in just 5 minutes.

Spyware 73
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.