Wed.Apr 09, 2025

article thumbnail

Tool Poisoning Attacks: Critical Vulnerability Discovered in Model Context Protocol (MCP)

Penetration Testing

Invariant Labs has disclosed a critical vulnerability in the Model Context Protocol (MCP) that enables what they call Tool Poisoning Attacks (TPAs) a class of threats that may allow sensitive data exfiltration, AI behavior hijacking, and even remote code execution via seemingly benign tools used by AI agents. We urge users to exercise caution […] The post Tool Poisoning Attacks: Critical Vulnerability Discovered in Model Context Protocol (MCP) appeared first on Daily CyberSecurity.

article thumbnail

The US Treasury’s OCC disclosed an undetected major email breach for over a year

Security Affairs

The US Office of the Comptroller of the Currency (OCC) disclosed a major email breach compromising 100 accounts, undetected for over a year. The US Treasurys Office of the Comptroller of the Currency (OCC) disclosed an undetected major email breach for over a year. The cybersecurity incident involved unauthorized access to emails via a compromised admin account.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SureTriggers Vulnerability Exposes 100,000+ WordPress Sites to Admin Takeover

Penetration Testing

A critical vulnerability in the popular WordPress automation plugin SureTriggers has exposed over 100,000 sites to the risk of unauthenticated administrative account creation, potentially allowing full site takeover. The vulnerability, tracked as CVE-2025-3102 with a CVSS score of 8.1, was responsibly disclosed by security researcher mikemyers through the Wordfence Bug Bounty Program.

article thumbnail

News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises

The Last Watchdog

Luxembourg, Luxembourg, Apr. 9, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity. This comes as organizations face a 56% year-on-year increase in high-volume, complex DDoS attacks that disrupt operations, increase latency, and compromise network security.

DDOS 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Evolving Cybercrime: Inside the Russian-Speaking Underground

Penetration Testing

The Russian-speaking cybercriminal underground remains a dominant force in the global cybercrime landscape. A recent report by Trend Micro, marking the 50th installment in their series on this subject, highlights the underground’s sophistication, resilience, and significant impact. The underground operates with a well-structured hierarchy where reputation is currency, and trust is earned through both criminal […] The post Evolving Cybercrime: Inside the Russian-Speaking Underground a

article thumbnail

Four Tips for Optimizing Data Backup and Recovery Costs

Security Boulevard

By taking simple steps like choosing a cost-effective backup storage strategy and minimizing recovery infrastructure costs, you can protect your business without bloating your budget. The post Four Tips for Optimizing Data Backup and Recovery Costs appeared first on Security Boulevard.

Backups 114

LifeWorks

More Trending

article thumbnail

How to Leak to a Journalist

Schneier on Security

Neiman Lab has some good advice on how to leak a story to a journalist.

245
245
article thumbnail

Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?

The Last Watchdog

For decades, a handful of tech giants have shaped digital infrastructureand, with it, how businesses and governments manage data, security, and connectivity. Related: Practical uses for edge computing Now, the rise of distributed edge computing is being touted as a potential game-changerpushing processing power closer to users, improving security, and redistributing control over digital assets.

Marketing 100
article thumbnail

WhatsApp for Windows vulnerable to attacks. Update now!

Malwarebytes

In a security advisory , Meta has disclosed a vulnerability that allowed an attacker to run arbitrary code on a users system that existed in all WhatsApp versions before 2.2450.6. WhatsApp offers a desktop application for Windows and macOS, which users can synchronize with their mobile devices. Desktop versions of WhatsApp are generally used as extensions of mobile apps rather than primary platforms.

Mobile 95
article thumbnail

Google Launches Unified Security Powered by Gemini AI, Enhances Enterprise Protection

Penetration Testing

Google has announced the launch of Google Unified Security, an integrated security solution powered by Gemini AI, along with the introduction of new security agents designed to help enterprises address the growing fragmentation of data and the inconsistency of security tools resulting from organizational scale. Much like the previously introduced experimental security model, Sec-Gemini v1, […] The post Google Launches Unified Security Powered by Gemini AI, Enhances Enterprise Protection ap

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Man accused of using keylogger to spy on colleagues, log in to their personal accounts and watch them at home

Malwarebytes

When you next type something sensitive on your computer keyboard, be sure that no-one else is watching. A recent case of alleged cyber-voyeurism shows how important it is to secure your computer against unwanted eavesdroppers using malwareware. In a class action lawsuit , six women have accused pharmacist Matthew Bathula of invading their privacy by spying on them at work and at home.

article thumbnail

Why Intelligent Continuous Security is the Future of Cyber Defense

Security Boulevard

Cyber defense is no longer about hard perimeters or checklists. Its about adaptability, intelligence, and integration. ICS offers that path forward. Its time to move beyond SecOps and DevSecOpsthe future of cybersecurity is Intelligent Continuous Security. The post Why Intelligent Continuous Security is the Future of Cyber Defense appeared first on Security Boulevard.

article thumbnail

Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords

Security Affairs

Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. Fortinet has released security updates to address a critical vulnerability, tracked as CVE-2024-48887 (CVSS score 9.8), in its FortiSwitch devices. A remote attacker can exploit the vulnerability to change administrator passwords. “An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modif

article thumbnail

Solving the Identity Crisis: Okta Redefines Security in a Machine-Led World 

Security Boulevard

Okta is stepping forward with its boldest platform evolution yet, aiming to unify identity across human and machine actors, and extend zero-trust all the way from cloud to on-premises. The post Solving the Identity Crisis: Okta Redefines Security in a Machine-Led World appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CVE-2025-27590 – Oxidized Web: Local File Overwrite to Remote Code Execution

NetSpi Technical

The NetSPI red team came across a web application front-end for the Oxidized network device configuration backup tool ( Oxidized Web ) which was used to manage router and switch configurations during a recent client engagement. Oxidized-web is a web app extension for Oxidized. As it presented some new attack surface, and we could readily access the open source code base, we decided to briefly investigate the application.

article thumbnail

Thales Secures Top Spot in the ABI Research Payment HSM Assessment

Thales Cloud Protection & Licensing

Thales Secures Top Spot in the ABI Research Payment HSM Assessment madhav Thu, 04/10/2025 - 04:55 Thales has been named the top-ranked payment Hardware Security Module (HSM) vendor in the latest ABI Research Competitive Assessment Report. This recognition cements its leadership role in payment transaction security, thanks to the integrity of its payShield HSM portfolio, which has been widely deployed in financial institutions, payment processors, and fintech companies worldwide.

article thumbnail

NIST Deprioritizes Pre-2018 CVEs as Backlog Struggles Continue

Security Boulevard

NIST, which for more than a year has been struggling to address a backlog of CVEs in its database following budget cuts, is now putting pre-2018 vulnerabilities on the back burner to give itself more time to address the rapidly growing number of new software security flaws. The post NIST Deprioritizes Pre-2018 CVEs as Backlog Struggles Continue appeared first on Security Boulevard.

article thumbnail

“Pick Your Poison” Phishing Attack: Credentials or Malware?

Penetration Testing

Cybercriminals have upped their game with a phishing campaign so cunning, it offers victims a choicebetween stolen credentials or malware infection. Titled “Pick Your Poison”, this campaign was recently analyzed by the Cofense Phishing Defense Center, revealing a hybrid attack vector that leverages files.fm, a legitimate file-sharing platform, to deliver a double-edged payload.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.S. CISA adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws, respectively tracked as CVE-2025-30406 and CVE-2025-29824 , to its Known Exploited Vulnerabilities (KEV) catalog.

Hacking 66
article thumbnail

Amazon Unveils Nova Sonic: A Unified Model for Natural Voice AI Interactions

Penetration Testing

Amazon has unveiled a groundbreaking foundation model, Amazon Nova Sonic, which seamlessly integrates speech understanding and speech generation within a single architecture. This innovation delivers voice interactions that closely mimic human conversation, significantly enhancing AI-driven speech services. Available via Amazon Bedrock as an API, Nova Sonic can be deployed across a wide range of applicationsfrom […] The post Amazon Unveils Nova Sonic: A Unified Model for Natural Voice AI I

article thumbnail

The Invisible Data Battle: How AI Became a Cybersec Professional’s Biggest Friend and Foe

Security Boulevard

It comes as no surprise that as the incidence of cybercrime increases, cybersec teams are becoming faster at detecting threats. The post The Invisible Data Battle: How AI Became a Cybersec Professionals Biggest Friend and Foe appeared first on Security Boulevard.

article thumbnail

Empowering Women in Cybersecurity: Insights from ISC2's Latest Study

SecureWorld News

The cybersecurity landscape is witnessing a transformative shift, with an increasing number of women entering the field through non-traditional pathways. A recent study by ISC2 highlights this trend, revealing how diverse educational backgrounds and experiences are enriching the cybersecurity workforce. The evolution carries significant implications for the industry, the existing workforce, male allies, and aspiring female cybersecurity professionals.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

PCI DSS 4.0: Time to Pay Up, Securely 

Security Boulevard

PCI DSS 4.0 compliance raises the regulatory bar with stricter authentication, continuous monitoring and tighter third-party oversight. The post PCI DSS 4.0: Time to Pay Up, Securely appeared first on Security Boulevard.

article thumbnail

Google Launches Cloud WAN for Secure, High-Performance Enterprise Networking

Penetration Testing

To address the expansive network transmission and coverage demands of enterprise and government institutions, Google has unveiled Cloud WAN at its Google NEXT 25 eventa fully managed, enterprise-grade backbone network service designed to deliver reliable and secure connectivity. By leveraging Googles globally deployed infrastructure, this service empowers organizations to build robust digital platforms with enhanced […] The post Google Launches Cloud WAN for Secure, High-Performance Enterp

article thumbnail

Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’

Tech Republic Security

Microsoft warns CVE-2025-29824 lets attackers with user access escalate privileges to deploy ransomware via a flaw in Windows CLFS.

article thumbnail

Post-Quantum Cryptography: Preparing for a Quantum Future

Security Boulevard

As quantum computing continues to evolve, the security of our digital infrastructure is under increasing scrutiny. While quantum computers promise groundbreaking advancements, they also pose a significant threat to the cryptographic algorithms that protect sensitive information across the internet. Enter Post-Quantum Cryptography (PQC) which is our path to quantum safe security.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

What are AI agents? How to access a team of personalized assistants

Zero Day

Agentic AI is all the rage, but what can it actually do for you or your company? Here's everything you need to know.

129
129
article thumbnail

So your friend has been hacked: Could you be next?

We Live Security

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.

Hacking 126
article thumbnail

Google Workspace Introduces Workspace Flows and AI Enhancements

Penetration Testing

In its latest update to Google Workspace, Google has unveiled a new workflow automation service known as Workspace Flows, designed to integrate seamlessly with the previously introduced Gemsa customizable AI agent service powered by Gemini technologyto handle specialized and complex tasks. With just a simple prompt, users can swiftly construct logic-driven workflows capable of managing […] The post Google Workspace Introduces Workspace Flows and AI Enhancements appeared first on Daily Cybe

article thumbnail

Is It Worth It? Let Me Work It: Calculating the Cost Savings of Proactive Security

NetSpi Executives

Cost Savings Tool for NetSPIs Solutions: External Attack Surface Management (EASM), Cyber Asset Attack Surface Management (CAASM), and Breach and Attack Simulation (BAS) as a Service If there’s one truth that we can all agree on, it’s this: effective cybersecurity requires investment. But breaches? They’re staggeringly expensive. Many organizations are stuck playing an outdated, defensive game of triaging alerts, reacting to threats as they pop up instead of addressing vulnerab

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!