Tue.Apr 08, 2025

article thumbnail

Arguing Against CALEA

Schneier on Security

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically.

article thumbnail

Patch Tuesday, April 2025 Edition

Krebs on Security

Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being exploited in the wild. Eleven of those flaws earned Microsoft’s most-dire “critical” rating, meaning malware or malcontents could exploit them with little to no interaction from Windows users.

Software 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Joint Advisory Warns of Fast Flux DNS Tactics Evading Detection

SecureWorld News

A joint cybersecurity advisory was recently issued by the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and their counterparts from Australia, Canada, and New Zealand. The advisory highlights the escalating threat of "fast flux" techniques employed by cyber adversaries to obscure malicious activities and evade detection.

DNS 104
article thumbnail

Vidar Stealer Hides in Legitimate BGInfo Tool

Penetration Testing

Vidar Stealer, a notorious information-stealing malware that first emerged in 2018, continues to pose a significant threat by employing new distribution methods and evasion techniques. G DATA Security Lab’s analysis has uncovered a recent instance where Vidar Stealer was disguised within a legitimate system information tool. Vidar Stealer functions as Malware-as-a-Service (MaaS) and is used […] The post Vidar Stealer Hides in Legitimate BGInfo Tool appeared first on Daily CyberSecuri

Malware 115
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

WhatsApp fixed a spoofing flaw that could enable Remote Code Execution

Security Affairs

WhatsApp addressed a flaw, tracked as CVE-2025-30401, that could allow attackers to trick users and enable remote code execution. WhatsApp released a security update to address a vulnerability, tracked as CVE-2025-30401, that could let attackers trick users and enable remote code execution. The spoofing flaw impacts WhatsApp for Windows before version 2.2450.6.

Spyware 103
article thumbnail

Google fixes two actively exploited zero-day vulnerabilities in Android

Malwarebytes

Google has patched 62 vulnerabilities in Android, including two actively exploited zero-days in its April 2025 Android Security Bulletin. When we say “zero-day” we mean an exploitable software vulnerability for which there was no patch at the time of the vulnerability being exploited or published. The term reflects the amount of time that a vulnerable organization has to protect against the threat by patchingzero days.

Spyware 116

LifeWorks

More Trending

article thumbnail

Google fixed two actively exploited Android zero-days

Security Affairs

Google addressed 62 vulnerabilities with the release of Android ‘s April 2025 security update, including two actively exploited zero-days. Google released Android ‘s April 2025 security updates to address 62 vulnerabilities, including two zero-day vulnerabilities ( CVE-2024-53197 , CVE-2024-53150 ) exploited in targeted attacks. The vulnerability CVE-2024-53197 is a Linux kernel issue affecting ALSA USB audio.

Hacking 91
article thumbnail

Inaba Denki Sangyo Wi-Fi AP Units Affected by Critical Vulnerabilities

Penetration Testing

A recent security advisory from JPCERT/CC has highlighted multiple vulnerabilities in Inaba Denki Sangyo Co., Ltd.’s Wi-Fi AP UNIT ‘AC-WPS-11ac series’ These vulnerabilities affect several models within the series, posing a risk to the security and integrity of networks using these devices. According to the advisory, eight distinct vulnerabilities affect several models within the AC-WPS-11ac […] The post Inaba Denki Sangyo Wi-Fi AP Units Affected by Critical Vulnerabiliti

Risk 97
article thumbnail

Attackers distributing a miner and the ClipBanker Trojan via SourceForge

SecureList

Recently, we noticed a rather unique scheme for distributing malware that exploits SourceForge, a popular website providing software hosting, comparison, and distribution services. The site hosts numerous software projects, and anyone can upload theirs. One such project, officepackage , on the main website sourceforge.net , appears harmless enough, containing Microsoft Office add-ins copied from a legitimate GitHub project.

article thumbnail

Apache mod_auth_openidc Vulnerability Exposes Protected Content

Penetration Testing

In a recently published security advisory, OpenIDC has revealed a vulnerability in mod_auth_openidc, the widely used OpenID Connect module for the Apache HTTP server. The flaw, tracked as CVE-2025-31492 and rated 8.2 on the CVSSv4 scale, allows unauthenticated users to access protected web content under specific conditionspotentially undermining the security of applications relying on OpenID […] The post Apache mod_auth_openidc Vulnerability Exposes Protected Content appeared first on Dail

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Tax deadline threat: QuickBooks phishing scam exploits Google Ads

Malwarebytes

The pressure of the looming tax filing deadline (April 15th in the US) can make anyone rush online tasks. Cybercriminals are acutely aware of this increased activity and are exploiting trusted platforms like Google to target Intuit QuickBooks users. By purchasing prominent Google Ads, they are creating highly convincing fake login pages designed to pilfer sensitive information, including usernames, passwords, and even one-time passcodes (OTPs) the keys to someone’s financial data needed f

article thumbnail

Fortinet: Critical Unverified Password Change Flaw in FortiSwitch

Penetration Testing

Fortinet has released a security advisory addressing a critical vulnerability in FortiSwitch products. The vulnerability, identified as CVE-2024-48887 (CVSS 9.3), could allow attackers to gain unauthorized access to affected systems. The advisory highlights an “unverified password change vulnerability [CWE-620] in FortiSwitch GUI“ This flaw may enable “a remote unauthenticated attacker to modify admin passwords via […] The post Fortinet: Critical Unverified Password Chang

article thumbnail

Everest ransomware group’s Tor leak site offline after a defacement

Security Affairs

The Tor leak site of the Everest ransomware group went offline after being hacked and defaced over the weekend. The Everest ransomware gangs darknet site went offline after being hacked and defaced, with victim listings replaced by the following message. Dont do crime CRIME IS BAD xoxo from Prague read the message published on the site’s homepage after the defacement.

article thumbnail

SourceForge Used to Distribute ClipBanker Trojan and Cryptocurrency Miner

Penetration Testing

For many developers, SourceForge has long been a cornerstone of open-source collaboration a trusted hub to host and distribute software. But for cybercriminals, it has recently become a platform to stage deception. In a disturbing discovery by Kaspersky Labs, attackers have been exploiting SourceForge to deliver a sophisticated malware combo: a ClipBanker Trojan and […] The post SourceForge Used to Distribute ClipBanker Trojan and Cryptocurrency Miner appeared first on Daily CyberSecurity

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google AI taken for a ride by April Fools’ Day joke

Malwarebytes

Cwmbran in Wales, a town with a population of just under 50,000, holds the Guinness World Record for the most roundaboutsat least according to Google AI Overviews. Except that’s not actually true… Ben Black has been publishing lighthearted fake stories on April Fools Day for his community news site Cwmbran Life since 2018. The April Fools include the erection of a Hollywood-style sign on a mountain, and the creation of a nudist cold-water swimming club at a lake.

article thumbnail

Grandoreiro Trojan Resurges in Phishing Attacks

Penetration Testing

Cybercriminals are actively distributing the Grandoreiro banking trojan through large-scale phishing campaigns, primarily targeting banking users in Latin America and Europe. According to a report by Forcepoint X-Labs, this resurgence involves the use of advanced techniques to evade detection and maximize impact. The report highlights a specific campaign targeting users in Mexico, Argentina, and Spain. […] The post Grandoreiro Trojan Resurges in Phishing Attacks appeared first on Daily Cyb

article thumbnail

How To Permanently Block Certain Websites On Google Chrome

SecureBlitz

People block websites permanently from their Google Chrome browser for various reasons. Maintaining a website on Google Chrome can be helpful for multiple reasons, such as protecting yourself from online distractions or blocking malicious or inappropriate content. Some want to get rid of all the distractions to focus on themselves. Some find specific sites too […] The post How To Permanently Block Certain Websites On Google Chrome appeared first on SecureBlitz Cybersecurity.

article thumbnail

SAP April 2025 Patch Day: Critical Code Injection Risks

Penetration Testing

The SAP Security Patch Day on April 8, 2025, brought a wave of critical security updates, with a total of 18 new Security Notes and 2 updates to previously released notes. Among the fixes, several address severe code injection vulnerabilities that pose a significant threat to SAP systems. Critical Vulnerabilities in Focus: Two of the […] The post SAP April 2025 Patch Day: Critical Code Injection Risks appeared first on Daily CyberSecurity.

Risk 70
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

21 Countries Sign Onto Voluntary Pact to Stem the Proliferation of Spyware

Security Boulevard

Twenty-one countries signed onto the Pall Mall Process, an effort a year in the making that was created to develop a framework nations could adopt to address the proliferation and malicious use of spyware by governments that want it to track human rights workers, activists, journalists, and other such targets. The post 21 Countries Sign Onto Voluntary Pact to Stem the Proliferation of Spyware appeared first on Security Boulevard.

Spyware 66
article thumbnail

Oracle Data Breach: Authenticity Confirmed Despite Denial

Penetration Testing

At the end of March, a hacker claimed to have breached Oracles cloud infrastructure, allegedly exfiltrating approximately six million records. These reportedly included sensitive materials such as Oracle Cloud customer security keys, encrypted credentials, and LDAP authentication data. The threat actor even published a sample of the data as proof. Oracle promptly denied the breach, […] The post Oracle Data Breach: Authenticity Confirmed Despite Denial appeared first on Daily CyberSecurity.

article thumbnail

Qevlar Raises $14M to Lead the Agentic AI Revolution

Security Boulevard

Qevlar leads the agentic AI revolution and raises $14 million in total funding, including a fresh $10 million round led by EQT Ventures and Forgepoint Capital International. The post Qevlar Raises $14M to Lead the Agentic AI Revolution appeared first on Security Boulevard.

article thumbnail

Google Patches 23-Year-Old Chrome Vulnerability That Leaked Browsing History

Penetration Testing

Although Chrome itself has not yet reached its 23rd anniversary, the history of web browsers stretches much further back. A recently patched vulnerability by Google theoretically affects all browsers and could allow online advertisers to infer users browsing historiesthereby enabling the delivery of targeted ads. The exploit is deceptively simple. Typically, hyperlinks on a webpage […] The post Google Patches 23-Year-Old Chrome Vulnerability That Leaked Browsing History appeared first on D

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)

Security Boulevard

11 Critical 110 Important 0 Moderate 0 Low Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild. Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. This months update includes patches for: ASP.NET Core Active Directory Domain Services Azure Local Azure Local Cluster Azure Portal Windows Admin Center Dynamics Business Central Microsoft AutoUpdate (MAU) Microsoft Edge (Chromium-based) Microsoft Edge

Media 59
article thumbnail

Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal

The Hacker News

Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution.

article thumbnail

Your Go-To Web Application Pentesting Checklist

Security Boulevard

Web applications are integral to modern business operations, facilitating customer engagement, financial transactions, and internal processes. However, their widespread use and complexity make them prime targets for cyber threats. A. The post Your Go-To Web Application Pentesting Checklist appeared first on Strobes Security. The post Your Go-To Web Application Pentesting Checklist appeared first on Security Boulevard.

article thumbnail

Preparing a Cryptographic Inventory for a Post Quantum Computing World

Approachable Cyber Threats

Category CMMC, FedRAMP, Vulnerabilities Risk Level Quantum threats are real - and your cryptographic assets are at risk. QrytpoCyber , one of our leading products, shows why creating a full cryptographic inventory is step one in futureproofing your organizations cybersecurity. Watch the video to see how were solving one of cybersecuritys most complex challenges.

Risk 63
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

When Good Tools Go Bad: Dual-Use in Cybersecurity

Security Boulevard

In the ever-evolving world of cybersecurity, certain tools and techniques possess a fascinating duality. They're designed to protect our digital lives, yet they can also be wielded by malicious actors to carry out cyberattacks. These are known as "dual-use" techniques and understanding them is crucial for anyone involved in cybersecurity. What Exactly Are Dual-Use Techniques?

article thumbnail

Europol Operation Dismantles Major Euro Counterfeiting Ring

Penetration Testing

A large-scale, multi-national operation supported by Europol has led to the arrest of several members of a criminal group producing high-quality counterfeit euro banknotes. The coordinated effort spanned across multiple European countries, striking a significant blow to the illicit production and distribution of fake currency. The investigation, spearheaded by the Italian Carabinieri, involved close cooperation […] The post Europol Operation Dismantles Major Euro Counterfeiting Ring appear

article thumbnail

How to start using the new Linux terminal on your Android device

Zero Day

Google just added a powerful new feature to Android: The Linux terminal. It's easier than you think to use and it unlocks a whole new level of control.

128
128
article thumbnail

The SQL Server Crypto Detour

Security Boulevard

As part of my role as Service Architect here at SpecterOps, one of the things Im tasked with is exploring all kinds of technologies to help those on assessments with advancing their engagement. Not long after starting this new role, I was approached with an interesting problem. A SQL Server database backup for a ManageEngines ADSelfService Plus product had been recovered and, while the team had walked through the database recovery, SQL Server database encryption was in use.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!